c20b940856097c52f9a552928c9f7cdc62b77692a24dfd15213511888c80a09724457beaa4adb47176154c3df6ca707d814e5c92a291ef4d40b9504512d56add39d7a8808", 0x82, 0x7, 0x2, 0xfff, 0x1, 0x6, 0x7, 0x1}, r7}}, 0x128) 03:29:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xf0ffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r5 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r5}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r7, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0xfffffffffffffffa, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0x69) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001440)={'lapb0\x00', 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000001480)=@newsa={0x21c, 0x10, 0x200, 0x70bd2a, 0x25dfdbfc, {{@in=@broadcast, @in=@empty, 0x4e20, 0x0, 0x4e23, 0xfafa, 0x2, 0x80, 0xa0, 0x0, r1, r2}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x3c}, @in=@multicast1, {0x9, 0x1ff, 0x3, 0x9, 0x0, 0x0, 0xfffffffffffffffe, 0x4}, {0x9, 0x1ff, 0x2}, {0x4662, 0x0, 0x6}, 0x70bd2b, 0x0, 0xa, 0x4, 0x2, 0x8}, [@replay_thresh={0x8, 0xb, 0x3ff}, @offload={0xc, 0x1c, {r3, 0x1}}, @coaddr={0x14, 0xe, @in=@rand_addr=0x5}, @algo_auth_trunc={0x104, 0x14, {{'nhpoly1305-sse2\x00'}, 0x5c0, 0x80, "a7ed5b8a18db0035c252e7742b45ce190c6b6b68cb944edd7b13421b9a38da60b7b3c96339e0304501b937433d6c25b8dc45a11818ab413ecf19455007ae6b8416d8de64c82459f3481323269a0beae36bf926f4417cdc079825f220ce464f3234c47de824ec7d90ab5b733baa8b2de5c7f343f07cb22ac9ace50a51bd7844321f801854d506f5f3fa0c133a4d3e4ea3bf39e54de54d12027ba15cdc8a012635db6ce6e8e63d9b2c7d0f290e29fc1bccb72a386cbc869f7d"}}]}, 0x21c}}, 0x20000080) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x38}, [{}]}, 0x58) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000002c0)=ANY=[], 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) close(r5) socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f00000000c0)=0x4) sendfile(r5, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 03:29:51 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x1000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001440)={'lapb0\x00', 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000001480)=@newsa={0x21c, 0x10, 0x200, 0x70bd2a, 0x25dfdbfc, {{@in=@broadcast, @in=@empty, 0x4e20, 0x0, 0x4e23, 0xfafa, 0x2, 0x80, 0xa0, 0x0, r1, r2}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x3c}, @in=@multicast1, {0x9, 0x1ff, 0x3, 0x9, 0x0, 0x0, 0xfffffffffffffffe, 0x4}, {0x9, 0x1ff, 0x2}, {0x4662, 0x0, 0x6}, 0x70bd2b, 0x0, 0xa, 0x4, 0x2, 0x8}, [@replay_thresh={0x8, 0xb, 0x3ff}, @offload={0xc, 0x1c, {r3, 0x1}}, @coaddr={0x14, 0xe, @in=@rand_addr=0x5}, @algo_auth_trunc={0x104, 0x14, {{'nhpoly1305-sse2\x00'}, 0x5c0, 0x80, "a7ed5b8a18db0035c252e7742b45ce190c6b6b68cb944edd7b13421b9a38da60b7b3c96339e0304501b937433d6c25b8dc45a11818ab413ecf19455007ae6b8416d8de64c82459f3481323269a0beae36bf926f4417cdc079825f220ce464f3234c47de824ec7d90ab5b733baa8b2de5c7f343f07cb22ac9ace50a51bd7844321f801854d506f5f3fa0c133a4d3e4ea3bf39e54de54d12027ba15cdc8a012635db6ce6e8e63d9b2c7d0f290e29fc1bccb72a386cbc869f7d"}}]}, 0x21c}}, 0x20000080) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x38}}, 0x38) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000002c0)=ANY=[], 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) close(r5) r6 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) open_by_handle_at(r6, &(0x7f00000003c0)={0xfa, 0x80, "542855094bc572aa62782435a5fb38a263a09a690df9584b2228bf07a0d6d1b922b8e44149e2856ec0bba98a6e5dee1ebbb892c58426cf9ea92a5011cdfd0dd1aff005a42f46663b494787490119dcb4ec95b1fb22cb119968bf3e08d73f0f6fe7393db4aa858fb95726c0f9fcadf87af9214802a0bbaddd95006594f39ab7d0a2c3282ef146f1ef3274446c1ec0270d45c32e24d4da78d472e41d5517f36c3f77a41700e7cae66ba1215d5cf32e1b78413e50022d7b5f8ef0b69710bec47fceb157c5eebff247be3bd8b08e9048e24bd471cad85af58feef80e80d3592c2eddc48e54d38e2b94094caafd47120d87823736"}, 0x80000) sendfile(r5, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 03:29:52 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x2000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 4 (fault-call:8 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x3070000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:52 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x3f000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x40000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x60000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xa0008000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xfeffffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xfffff000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x8000a0ffffffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xf0ffffffffffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:55 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x100000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x200000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x307000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:56 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c8546"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x3f00000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x70) 03:29:57 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x4000000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x200003a8) 03:29:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x6000000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7, 0x100) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000003c0)={0x0, 0x1, 0x7fffffff, 0x5, 0x13, 0x3f, 0x8, 0x3ff, 0x7ff, 0x6, 0x5, 0x5}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xfeffffff00000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xffffffffa0008000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f00000003c0)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0xfffffffffffff000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:58 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0200000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = dup(r1) sendmsg$nfc_llcp(r2, &(0x7f0000000680)={&(0x7f00000003c0)={0x27, 0x1, 0x2, 0x3, 0xffffffffffffff86, 0x7ff, "c1170a65ab28b8d0539523dcf800e8cb6a63f74aca957292804063d43001ee2bbaf4b561cb823c2e7b1774c3c16627d27c84ee534ea06788ae509cf658b743", 0x34}, 0x60, &(0x7f0000000c00)=[{&(0x7f0000000880)="b172478d262880966bf02136d3231d80dfd2a5a9c141f80e3cfee65408d22b771dbd81b2d838c7da95f0777dfd54721c4e9c21008cd72f2b312ebe0de07de8a40009d61a1180f1e12a5ba4c6c972ae03648ff97526e014a8b1c274f3dc0df5521c89fbd32bf3b47d376915fdf13991b1705372028ef9254c88ab4f4af368554e3ea0015effc0378c95b094a3e0e39ec63ae43e1030b753d7f2dbd5f34f74866450db1b0ab6e67c02e3333f0a09922ec20a93a98ea6bb03137e1540a1177477aa3a674cd548d57a9259c345aa6a364467", 0xd0}, {&(0x7f0000000440)="5d414e52e365d208501859c9b079c2bfbd643b9442f58cb874383bc12743a564cd994c2513f986adefcffa30f9b14655bb192acfa24f5918eb10b681e18a6642f398d1850d8432fdb7ce3d1079d078670a6d58b2f182db3ca8b9384a4f245409235c2e794cb5861d3f0e82f112064a27f43c28073ed6c8e0e36d66118647d7558ade37c462e985d5b4", 0x89}, {&(0x7f00000009c0)="4a73f7d5b4daad2d587d6043c64669a7e9313537e444d73626e37cf71c5fdd9d1e8ce5cb1da8d2d3e412f35b8d062d1b9be2b83be4d5971db3934d66863ee4a255417141151876d2fe8dde1001a42faaf48dbdf3c3ee3cc50ee693d987511ebbfb3ac05302b76991654de278c22ce4f34106d014297fd88189e504780a18d04f5e031ca6360f13c33e8db1d5b734070144be834dabf150f54a7b39090df3766e00e2bdec63d9660ac920a1d8fd66b7e6e77c6e1d16d223907bcb", 0xba}, {&(0x7f0000000a80)="8133937ae27231ac56901b50a3f6c47ef83112407abea321fe23b97e74be0ab8c02efc0bb64b2785a74b82c8ed1d0fcc90ab794aca493238eb21b3b2afe36905e41c37c3f98e657bb25ecd30530abca9d86b8b991d18a097f5d2bc6a5663b54b9971e1c4a7b2e70f1d0cb1cb", 0x6c}, {&(0x7f0000000b00)="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", 0xfa}], 0x5, &(0x7f0000000280)={0x18, 0x107, 0x9, "19b0d6443d"}, 0x18, 0x4000004}, 0x4) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="6000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = fcntl$dupfd(r0, 0x406, r1) sendto$unix(r2, &(0x7f00000003c0)="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", 0xfb, 0x80, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r5, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000880)='trusted.overlay.nlink\x00', &(0x7f00000008c0)={'U-', 0xfffffffffffffffa}, 0x28, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000015c0)=@broute={'broute\x00', 0x20, 0x3, 0xbf2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200009c0], 0x0, &(0x7f0000000900), &(0x7f00000009c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x0, 0x8864, 'bcsf0\x00', 'syz_tun\x00', 'bpq0\x00', 'bcsh0\x00', @dev={[], 0x1c}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0x0, 0xff], 0xde, 0x12e, 0x17e, [@connbytes={'connbytes\x00', 0x18, {{0x7, 0x3, 0x0, 0x2}}}, @cgroup0={'cgroup\x00', 0x8, {{0x400}}}], [@common=@log={'log\x00', 0x28, {{0x3, "3ae74d3ceee556a268041ca41d0bea7f833f947b7f051458927740479f56", 0x6}}}], @common=@log={'log\x00', 0x28, {{0x4, "04d6759578b5ec052525717f9640f2c1d56003e06ad2669400e62bb78aec", 0x2}}}}, {0x5, 0x10, 0x8f37, 'bridge0\x00', 'veth0_to_bridge\x00', 'lo\x00', 'rose0\x00', @random="bab8c3828192", [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], @remote, [0x1a7040d43cd09a45, 0xff, 0xff, 0xff, 0xff, 0xff], 0x896, 0x896, 0x8ce, [@devgroup={'devgroup\x00', 0x18, {{0x2, 0x0, 0x5, 0x3ff, 0xff}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x0, 0x2}, {0xfff, 0x2}, {0x80}, {0x1, 0x1}, {0x1, 0x2}, {0x1, 0x3}, {0x1, 0x3c338c934fefecac}, {0x9}, {0x1, 0x42a1ff3f8d6647f1}, {0xd2, 0x3}, {0x3, 0x3}], [{0x400, 0xfffffffeffffffff}, {0x4, 0x7}, {0x3, 0x8001}, {0x5, 0x8}, {0x0, 0xffffffffffffffe1}, {0x8000, 0x100}, {0x6, 0x4}, {0x3, 0x8000}, {0x9, 0x6}, {0xff, 0x200}, {0xfffffffffffffbff, 0x100}], 0x8, 0x4}, {[{0x1, 0x1}, {0x100000001}, {0x1, 0x3}, {0x0, 0x2}, {0x4, 0x1}, {0x6, 0x2}, {0x1, 0x1}, {0x100000001, 0x3}, {0x80000000, 0x2}, {0x3f}, {0x100, 0x1}], [{0x124, 0x3d82}, {0x1, 0xffffffff}, {0x1, 0x8}, {0x2}, {0x40, 0x64}, {0x3, 0x100}, {0x7}, {0xcc, 0x9f0}, {0x7, 0x1805}, {0x46, 0x400}, {0x200, 0x7}], 0x6, 0x4}, {[{0xb6, 0x3}, {0x8, 0x2}, {0x4bef, 0xb1b7f79653af7ad3}, {0x5, 0x3}, {0xfffffffffffffff8, 0x3}, {0x5}, {0x0, 0x1}, {0x603, 0x1}, {0x81, 0x2c76a1ee5a33ced4}, {0x7, 0x2}, {0x6, 0x3}], [{0x8, 0x7fff}, {0x101, 0x1f}, {0xcd, 0x1ff}, {0x40, 0x2}, {0x8, 0x8}, {0x2, 0x8}, {0x1000, 0xb}, {0x2, 0xe5}, {0xfffffffffffffffa, 0x7}, {0x200000000000000, 0x9}, {0x3, 0xa6}], 0x4}, {[{0xd353, 0x2}, {0x47, 0x3}, {0x0, 0x3}, {0x10001}, {0x6, 0x1}, {0x1, 0x2}, {0x793395e5, 0x3}, {0x3, 0xe141ff511cb89a20}, {0x9, 0x2}, {0x100000001, 0x1}, {0x40, 0x1}], [{0x9062, 0x1}, {0x6, 0x10001}, {0x4, 0x9}, {0x3, 0x5}, {0x2, 0x5}, {0x54f, 0x100}, {0x800, 0xffff}, {0x0, 0x10001}, {}, {0x80000001, 0x2}, {0x3, 0x7}], 0x0, 0x7}, {[{0x9, 0x3}, {0x7}, {0x6}, {0x7, 0x3}, {0x3, 0x3}, {0x1, 0x1}, {0x8, 0x3}, {0x8, 0x2}, {0x400, 0x3}, {0x9, 0x4680be4a252ab558}, {0xaf, 0x3}], [{0x8000, 0xfffffffffffffffd}, {0x0, 0x1000}, {0x8, 0x40}, {0x4, 0x1000}, {0x7ff, 0x7}, {0x79, 0x1}, {0x7, 0x2}, {0x0, 0x2e38000000000000}, {0x1, 0x2}, {0x5, 0x1}, {0x0, 0x3}], 0x9, 0x3}, {[{0xecd5}, {0x6, 0xc8490f8a789ceac1}, {0x8, 0x3}, {0xfffffffffffffbff, 0x1}, {0x2, 0x1}, {0x2d3, 0x3}, {0x6, 0x1}, {0x480, 0x3}, {0xfff}, {0x1, 0x3}, {0x40}], [{0x40, 0xfffffffffffffff9}, {0x4, 0x3}, {0x9, 0xffffffffffffff0f}, {0x7b, 0xed05}, {0x4, 0x6}, {0x2, 0xffff}, {0x180000000000000, 0x2}, {0x3f5, 0x84d}, {0xffff, 0x81}, {0x4, 0x6f10}, {0x7, 0x9}], 0x9, 0x7}, {[{0x401, 0x24a8c5a58ea710fd}, {0x8, 0x3}, {0xfffffffffffffffb, 0x1}, {0xfa, 0x1}, {0x8, 0x2}, {0x81, 0x3}, {0xfffffffffffffffe, 0x1}, {0xfffffffffffffffd, 0x3}, {0xac5, 0x1}, {0x4, 0x2}, {0x8, 0x2}], [{0x2, 0xffffffffffffff7a}, {0x400, 0x1ff}, {0x9}, {0x7, 0x1}, {0x2, 0x5}, {0x9, 0x2}, {0xfc00000000000000, 0x4}, {0x20, 0x7f}, {0x1, 0x1}, {0x200, 0x9}, {0xfffffffffffffffc, 0xffffffffffffffff}], 0x5, 0xb}, {[{0x1, 0x1}, {0x7fff, 0x3}, {0xfff, 0x1}, {0x9, 0x2}, {0x5, 0x3}, {0x6, 0x1204c654aa682610}, {0x8a, 0x3}, {0x4, 0x1}, {0x8, 0x3}, {0x8001, 0x1}, {0xffffffffffffffed, 0x2}], [{0xfffffffffffeffff, 0x82a}, {0x9, 0xfff}, {0x101, 0x20}, {0xfffffffffffffe01, 0xffffffffffffffe1}, {0x1, 0x200}, {0x1000, 0x1}, {0x1, 0x1f}, {0xffff, 0x7}, {0x6, 0x81}, {0x5, 0x4}, {0x3, 0x1}], 0x0, 0x9}, {[{0x100}, {0x5}, {0x8, 0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x81, 0x1}, {0x6, 0x2}, {0x6, 0x1}, {0x1f}, {0x200}, {0x3, 0x2}], [{0x8, 0x9}, {}, {0x6, 0x1c}, {0x401, 0x8}, {0x6, 0x6}, {0x200, 0x1}, {0x7fffffff, 0x3}, {0x4, 0x6}, {0x6, 0xa7746c8}, {0xff, 0x8}, {0x1, 0x4}]}, {[{0x2, 0x3}, {0xd3b}, {0x1, 0x2}, {0x20, 0x3}, {0x400, 0x1}, {0x1}, {0x7, 0xcb4f29e1788bf02e}, {0x4, 0x3}, {0x4}, {0xd38}, {0x1, 0x3}], [{0x99, 0xd74}, {0x1, 0x3}, {0x9, 0x5}, {0x0, 0x100000000}, {0x1, 0xffffffffffffff01}, {0xfffffffffffffff8, 0x2}, {0x0, 0x7fff}, {0x0, 0x8}, {0x1, 0x2}, {0x6, 0x9}, {0x2, 0xffffffffffffffe1}], 0x0, 0x4}, {[{0x3, 0x1}, {0xffffffffffffffe0}, {0x1, 0x3}, {0x2, 0x2}, {0xffffffffffffff00, 0xea0c611c46776c59}, {0xfffffffffffffffd, 0x3}, {0x4, 0x1}, {0x7, 0x1}, {0x1, 0x3}, {0x0, 0x1}, {0x5, 0x1}], [{0x0, 0x1}, {0x9, 0x1}, {0x4, 0x6adc}, {0x6, 0x271}, {0xffffffffffffffff, 0xef}, {0x7fffffff}, {0x3f}, {0x9, 0x4}, {0x1, 0x7}, {0x4, 0x3}, {0xff, 0x2}], 0x3, 0x8}]}}}], [], @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x60, 0x6, 'batadv0\x00', 'vcan0\x00', 'sit0\x00', 'batadv0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x9e, 0x9e, 0xe6, [@vlan={'vlan\x00', 0x8, {{0x4, 0x4, 0x6001, 0x4, 0x1}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x36, 0x9, 0x6}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0xc6a) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f00000004c0)={0xc2, &(0x7f00000003c0)="a24abb0af772c043b0d4d49a10a935216b63c3cdbd6851ca25507a3178d2f9d32595f113e2eb4c726d44217a661773e2d79c2e81a031541efa54f334fd24037701866b21fcc98bdfb3cb546497c44ff2069701702078dd7ca385111596110782fb7b67e0bad8904271740165d71e8f36512b267b9c5377dcab2d5c9c2c28da48f2da16c549319dcfa26577e05f170b51f7cff7e9dd13232326dc769fbdcad61549bf3b4c05cfe38002e9abba8f04a67c9e852b9997bd04b4965832653093404ef4c1"}) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000680)={0x3, "0736bc8d85b2b4ff899d0aab2857c32e7ba3bcce2f1474adb1235eda95ac408e", 0x3, 0xf259c13cd5ec0058}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000940), &(0x7f0000001640)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000016c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000001780)={&(0x7f0000001680), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x1c, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48800}, 0x4000810) 03:29:59 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="f000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:29:59 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0703000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a7c5dad8e6f3b74f94f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f0600c8002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121652508e4070e5d09e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0307000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000180)=0x19d) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x200, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0x47, 0xd4, &(0x7f00000003c0)="b24b83cd40d402f36dc55c16ca4f41ef69c572acd7bc66c66b8baabe6b168a9abedb461562acfbcac291eeae20cdca0e12ef92b8ee01d54e4c3cdff6386286ca0299f860c0b590", &(0x7f0000000700)=""/212, 0x40}, 0x28) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x44200) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x200000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f75d6859856ac73c1678ef264c983bc7d79ec3ab4494353b9fb17090372d24476f0f8df40bb6427a76da76f5dbeaa80cedf83d6d9dcbb3b204026ca804592dbe778a271bf59601aaa0059d88facf7210da511a0284b379ca0ba5742c1a400aea6965a01a845e466e80ecb41131c46b46cc315812977f5b78e3de3b24801dad907aa44a7d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb1093"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="003f000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x102, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0xfc, 0xa2a79454b832ab18) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000003c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:00 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0040000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0060000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x44042, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0x102, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00f0000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000007c0)={'yam0\x00', 0x3ff}) r1 = syz_open_dev$dspn(&(0x7f0000000a80)='/dev/dsp#\x00', 0x0, 0xc4fdc7bcf0530259) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000ac0)={0x0, 0x1ff}, &(0x7f0000000b00)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000b40)={r2, 0x7fffffff, 0x5, 0x3}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000700)=0x1c, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000880)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/net/pfkey\x00', 0xc6bac70ba78c20c9, 0x0) ioctl$KDGKBDIACR(r4, 0x4b4a, &(0x7f00000009c0)=""/165) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xfd1e) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0xc4, 0x4000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae283793bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d00f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb10938200"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:01 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="a000800000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="fffff00000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000400)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000003c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d71aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000640)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000100000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0x200006ce, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000002fc0)={@remote, @multicast2, 0x0}, &(0x7f0000003000)=0xc) getsockname$packet(r0, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003f00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003f40)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000004040)=0xe8) sendmmsg$inet(r0, &(0x7f00000042c0)=[{{&(0x7f00000003c0)={0x2, 0x4e23, @rand_addr=0x8}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000400)="b002b1f8d4f0d5fb1891180716ce48ba14f49e0467850afe6ad72bf138df5f18d8b0b6c4113ce63325321ebc1c0a7693345b601be9f4025cf67de95bfe4804744c83aa13a0d8660d7a92232fbc85eb2898220ba1a40fd7e3e9bd37b92d01f9b32d134d499343", 0x66}, {&(0x7f0000000880)="6d96a247709ad2dbddacaa7e113e577189ace275229b04dc629b2298fb81b3390fc139bb40883ca02caae82a185035cf284a193c8b323d69cc9386e7bd0d6e24fb4e549dce30e2d349e451846b640652cbe47e26f50aaa15fe2629f76013663c3a56c939c54b47211ee45dd0a1eea35668e72c47e1843ce8c41370bd7930c260a8188b98b8c37fb96006351a63dfb10e0461d58cc6aa7f6ba78280990c78296b18875ae9be4747aa10c33093cb176908e8df67316244e49bb33a4e0d16fcb621a8981e7af3952bb5cd4a00c8baf439abd6d1228113a7dcb6896e5db876b59e8d9471433243", 0xe5}, {&(0x7f0000000480)="d61a7e28ce61f117428e2e06c44e74033740227f3957e0faff", 0x19}], 0x3, &(0x7f00000009c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x400000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x101}}], 0x48}}, {{&(0x7f0000000680)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002e40)=[{&(0x7f0000000a40)="b4a482a7110cb47cd5a3e94182ce24e203a63ba2e1de96e1fc651e87af6c4a737c9dd9b873d7949e21a49bfb9feb10078d068e", 0x33}, {&(0x7f0000000a80)="4aceb7a4076aac403661f51bafec5390916dbf37d1fcb3149e7692c4295270dcc7448a185050f1d75e0f5792b1cfd7602d413d56af3ab2956c00cd40e959d09b1b540c28bd26ad42f16d3109d045114c403933318a", 0x55}, {&(0x7f0000000b00)="f1df2812a07a2296d6dc47d45205fdce3d807b4370ef180c5caa85ca569db11ecdcdda865622b1333007f2ec2b64b9f534a3bd0a326bdf5602947b86aa1170caceee6efeca7982304aa4fd4f7f6269a23ba7a78937c1b826f0a3254c2aaa689faa6e2b043f43de817ce13a5600f37121e40236828e2e2fcd9981f9b86073ef0e7fd60b1a", 0x84}, {&(0x7f0000000bc0)="353b7002c1cc81638e6fc8f2db8a25601997c3e3f5194b9afcb6ddb71e50bf26097adc0fbc7776d94c968f18cb5e002b2437c0f052a9e3cc4863", 0x3a}, {&(0x7f0000000c00)="cee9fb15c94dad477471285efcc88fe3faf97abaf504d0bd55b91d855e45cc6501d5cb25b5cb106e39828396e6f06c31463b25b519414916d2d224d46be8ce446f0d7f681579ff7f79abce31e2c18117b6f6e20ac21dbdcb113ac9103efbf9ac06d0983197f463494910feb753e830b93864271209bcce", 0x77}, {&(0x7f0000000c80)="0b3b75ceb035339e8367b0eb52c3cd542233fb62ba8668d36262977b0642341a16a3f048bda440586a50446b96bb77e077b2a07328203eea1ab0a4fdf4e232b67ddf7f9c78ec211bc2a010ccc45a277a49098ca7a56d0bc93fc86342355036cfb9a4b0ef0149bc8524cb5f84d5b5ae0231f6ebd4e9d5cbb37feb3a5a48cdd2383ff28e16c0507d423eaed4ecad18be0d4f027b1774de", 0x96}, {&(0x7f0000000d40)="b0929ff09689f7404d41ff6fcb86dbd7119bf169ef44042667f9dae3a61e74ad60c4d66fab69d96e939e74f7fad4bd907083d0e651807f135b3560047d30c39e11d6d4b1d17c2dbf6da87586aa6926d2a94f4d350e1c0312271f968dab7bdd31c572d54b1284fca56ab8202819130900436715e48cc319d9fda9a6d7817b45eac4a0e41ddc7319d8131323755a018a69383ede50594731e853246c8c2e945964c6fbca35ed5829fe44807bf97e42ef1e4ab796ea2046ecabb1833ca7ab570171c4358c526e6b974518f8fba670e78efa8a6c6192b4b39f71f54b5878390b74ab146f85d0ff5f16a2dc6517d82818aa34fccc75b049", 0xf5}, {&(0x7f0000000e40)="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", 0x1000}, {&(0x7f0000001e40)="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", 0x1000}], 0x9, &(0x7f0000003040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x7f, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4db}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @dev={0xac, 0x14, 0x14, 0xb}}}}], 0x88}}, {{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000003100)="4ac280b5e31b3cbbab2e5946d3c29ded3d6b9b8545ec321234beccade65a24066e3776df548ccfbbb918d78244944db81e767a788d02c7713bc847d14a005e887b90e3edd9f108ad6de16d8399e2b43b329cf719f7f5610b6a92f78bc0", 0x5d}, {&(0x7f0000003180)="a01f33fb21ef954298f15211639e621fa9b5ac309813da1bb0beba4517f5d64c19901ba0c24bea3fe67eea92c70132952255bb88b542b288506f40fec1215fd5c2120098d493f355f72d6fd11e2348a282e3b811844ef25b3eac306e6b3c0d92daf84d3a188bae6cf68d672cd897c78fe4b2d7570530e2321b3314a26d805de16b2e297baa2fc10366323db0491a1fb952918fa87a1a3cbe9bfe5b67cf61e05df44a24559063a6696dab414498156fb75d1b7e1e92", 0xb5}, {&(0x7f0000003240)="5a207bc26cce8c9c43f430080c872ebb79ac9c083b10adb5e04512466779dc", 0x1f}], 0x3, &(0x7f00000032c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0x10001, [@empty, @remote, @loopback, @loopback, @multicast2, @local]}]}}}], 0x30}}, {{&(0x7f0000003300)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000003440)=[{&(0x7f0000003340)="d8a3dae912f51c112f9dd5055c6865f1decfe7cfa7e267d5c39bdba16001f43cfc492b96847a993800c7ad1021e9036dab950dbb93966f3e967fec5d243b3ed6137688a4a0799ea52c384d53738e15d37f481d1196c30eb18ceff99f544b3f538101c2a53f17004bec13778b57516274e9401e15bbea799422768bad07794a15031aaed1544917cb464de11761cc36f7e15e2f522466afa7d8c08af0cf40378456907a552d53bb573803e317d65bce0fa34664cdc2f315f99c946bcbb970e22336613558279634542346a4707e", 0xcd}], 0x1}}, {{&(0x7f0000003480)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000003800)=[{&(0x7f00000034c0)="16fd0d531b322fd628636eb0290ffb18e52bd3dd7daf41cbf8488668bf345e57f391c52aa55a8d1bb87eea8144d30952cebed9cafb32e9adacb0e25a7cca231bf18e7a9ab0aa7dce2acbe9d50d3a7b302e2fbdae54d4cc702ad132b7af7a3f3a12e95b3f35f36758bbf11eeacf796cc64f2ce9acb780fa218755b5d04224524449d4997f6576d3de7d6678aed1bfea1a8eea8dd845d4132543a136a90198440f9e326c1232a485350a923693243e164ef9f1b83194edac75d287df3a2102d6965914548666215d", 0xc7}, {&(0x7f00000035c0)}, {&(0x7f0000003600)="d9585f83c3952eb2c661997976f53e3bf1156766c8b60cbcd4b4d00acf86eff1e9cf845667dcd8b09d8d0ef0ee261806fb9daaa061cd538cc596ba4b7d5e710fb819aef6d801738558e379f1481dc142b8b8763321e96edbd917112cd8a67ab2e38aefbb99fa33d5e69f25302736479dc2f29c1c2ade34eb76f5557c384c264fadd330a31f4af4464cb2b8ded781c91a1f80e2a90bf9c044c6164fcde1b02a6bfdeb3e6e598c6be9a39947e4f272713e3e2deee46efac24f92", 0xb9}, {&(0x7f00000036c0)="a466e46e1829aeadafc6774e4c467bc1e43c3c4aad61", 0x16}, {&(0x7f0000003700)="268a21706a989fdcda3770aea866f9a2a017a8405f19cb79d0cd12119c3b8937c7cba71c924dee712c0c736e5649246fe7d3cf8432f3b48234c861b378adaac3171730746ca0b079c2e252b27c6cb8c83d9f4cdbe970ba8463a9657d96d6fda17ddff25f6ee25807ba6c66e812ff76d758aeb2bb18bb20fb2437329aa8e9ee2e5c5804", 0x83}, {&(0x7f00000037c0)="ccad9f55c425d08ed101318db53fa6d905", 0x11}], 0x6, &(0x7f0000003880)=[@ip_retopts={{0xa8, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0xfffffffffffffffb, 0x1, 0x11eae6c6, [{[], 0x8}, {[], 0x6}, {}, {[@remote], 0x2}]}, @rr={0x7, 0x1b, 0x6, [@dev={0xac, 0x14, 0x14, 0x28}, @multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @cipso={0x86, 0x65, 0xade, [{0x6, 0x3, '9'}, {0x1, 0x2}, {0x1, 0xa, "497622cb1a7046aa"}, {0x0, 0x3, 'z'}, {0x7, 0xf, "946ad2948ab2b0e9bb4f54e1d5"}, {0x0, 0xf, "64a0467fd7eb6773e37f4ca23e"}, {0x2, 0xc, "c5b39f1ebeee4c4aa362"}, {0x1, 0x11, "4ccd0798389b5ceb4399af42e722c3"}, {0x2e5b5e1b9e367740, 0x12, "43d211f302f11788e77ccb8fc8b6d212"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0xc0}}, {{&(0x7f0000003940)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000003980)}}, {{&(0x7f00000039c0)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000003b80)=[{&(0x7f0000003a00)="0e1f66992787c2ebda47da8d3656870dee616910b1a98b31c32ddfa206ab3c766dce22192fb5e27d82552becd4d203a71054bff28c9332f42994de006bc12f24f9be0aef1423390eca63918c6b88f7ebc4508797bfe73fcffc54e9ba", 0x5c}, {&(0x7f0000003a80)="675918659cee79fc16127937e4ad268af2246cea8fbc4f0a1f4d9083c1d73b871c90c3d584f947c874d469f7a8869b749a7541753eae761bfc00879dee5714dbbfcb79a4577d0e7c5ba2de746ebc5961353311b6af55be0a88b0875a73604fe4353c99911e239596697bb3ea97ea8bbec3bdcd55dc398c1d1e937123fdbabd3f3c83b0a3ebdd6dd3be2a9a83b755c790817a2f5fedc3b29643b54ac485a3dbfb9f2d430203600f7326ce918939a4f0c49b8d828b074aa049a43d8dc44745ff942759c94adaca350d349740", 0xcb}], 0x2}}, {{&(0x7f0000003bc0)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000003d00)=[{&(0x7f0000003c00)="6a682a63ab2ab25acc6d7a1387b86927c33dc8ef991e8829f96d1bbbc1c38fd3ef341f5e6cba85a004f6619c01b882de1a042d1aae34fcfb65572b5853f656a454aca81a01aa191a5dad00623f69e6e4a0046cef88aeed4306e7b0a046cf724deaa15eb60384ea0afcd484d603c08b5bcadd7cbe8b980d854237f61c4c8333a0eb6f701b7a92572a6c51cd6c4fbded3841ba75b088985b5808b40265cd4edfe041907a11c3bc3a21acaeea460b20a7d1435ade4d0e9f15479349bef5c7d17305aa716e1fc8ab0fce1c6d799167f405737afd64a461c948ead1a5b35d8d4079ae1b5f90", 0xe3}], 0x1, &(0x7f00000041c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @multicast1, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @loopback}}}], 0xf0}}], 0x8, 0x840) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000280)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000640)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000200000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x2, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x44040, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000640)) r3 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000070300000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x60, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:30:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vga_arbiter\x00', 0x28000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r3, 0x8818564c, &(0x7f00000009c0)) fstat(r1, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = msgget(0x3, 0x100) msgctl$MSG_STAT(r4, 0xb, &(0x7f00000003c0)=""/181) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7a290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000003f00000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:30:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xf0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x240001, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000003c0)={0x20, 0x9, 0x4, 0x6f3}, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000400), &(0x7f0000000480)=0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000004000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:30:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x307, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a5008531eaff2d1b37421a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe0002000000000000de2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb1093827f7d238022a20eea2bc71da610d7c387cb230a60a993e74aee7a81b808d238ca6749a746de8894bc40e55c9455cb6fe010f9f942bf797adb2d460f78ff4d70c19b2aae79dec9c7f2b22b3b5c970f849199379d48d4cde839d4358f536d00d50ed5b7e4790d15210003ff7a506535af0d306b343fd5077574bbf34a199a61d9ff58c8a0476f93ee4af5c2cb500dd605f8724adf1bd82bdafb08c7fd2e6264aba8f38019d8164cf25611c708d1372502b00549b3776d86f71d4d09e2acfac1e486d733decda870fae07a317d5d3f8dec532077e5529c2edd81da15129b3c457e6eaf800006e3e9d9f5d78c75041c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffff5e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) 03:30:04 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000006000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x703, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="008000a000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:04 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x3f00, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, 0x0, 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="fffffffe00000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x102}, 0x28) 03:30:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x4, 0x2000) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000400)={0x0, 0x3, 0x200, &(0x7f00000003c0)=0x1}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xc0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x9afa, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x6, 0x2}, 0x0, 0x0, &(0x7f00000004c0)={0x5, 0x4, 0x3ff, 0xeaf}, &(0x7f0000000680)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=0xb3}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a00)=r2, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x284) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, 0x0, 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x4000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00f0ffff00000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x102}, 0x28) 03:30:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, 0x0, 0x44040, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x7fc, 0x84000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000680)='/dev/cachefiles\x00', 0x2800, 0x0) syz_open_dev$video4linux(&(0x7f00000008c0)='/dev/v4l-subdev#\x00', 0x800, 0x40) r2 = add_key(&(0x7f0000000900)='asymmetric\x00', &(0x7f0000000940)={'syz', 0x3}, &(0x7f00000009c0)="5cbc922a3c79d10ad2ade7ed661d9f4a935efe05e55e4bec279514b5dcbcfb80ff059c758aeda1268b09900151feff824f5b5b0b166438fba03713a7b84e97cf94588f6d2a9061a12eb693ea69c2039a90e217da162924842f6b1aa85b6ea6cacc52c8dd0f", 0x65, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a40)={r2, 0x2d, 0xc8}, &(0x7f0000000c40)=ANY=[@ANYBLOB="656e633d706b63739933af3120686173683d7368613235362d61726d363400"/82], &(0x7f0000000b00)="6c76bc9059e5621a0f4eecb08148a9ed041261be000aa0e7e9e3fd2edcf27c478dfef47fa85a81dc87110ed85e", &(0x7f0000000b40)=""/200) linkat(r0, &(0x7f00000004c0)='./file0\x00', r1, &(0x7f0000000880)='./file0\x00', 0x1400) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) read(r3, &(0x7f00000002c0)=""/100, 0x64) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040004040000f5067d60b7030000000080006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b1aa48cfcaebb1093820000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f00000003c0)={0x7, 0xa, 0x1}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x102}, 0x28) 03:30:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="feffffff00000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x6000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000880)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x102}, 0x28) 03:30:06 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="ffffffffa0008000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xf000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) r4 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0xbf}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000003c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x102}, 0x28) 03:30:06 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="fffffffffffff000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x102}, 0x28) 03:30:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x8000a0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000003c0)={0x5, 0x0, {0xffffffffffffffff, 0x1, 0x1d96000000, 0x2, 0x8}}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000001b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x102}, 0x28) 03:30:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xf0ffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000002b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x102}, 0x28) 03:30:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x80800) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000019c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x1000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000703b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x102}, 0x28) 03:30:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x2000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000280)=0x7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0xd4d5c4ef8edde6c5, 0x0) sendmsg$kcm(r2, &(0x7f0000000ec0)={&(0x7f00000000c0)=@isdn={0x22, 0x5, 0x0, 0x3f, 0xffffffff}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000140)="17141fc3d5cef1c768fda83736f29fca2361f778363d86499e9b21e09163412999aa38bbd2ecb02af7a5da7045eeb7e994b7365f651ad786cc", 0x39}, {&(0x7f00000003c0)="f4ef8f45eab4d14c4f88c3eac8706e20d2cd9d2f7f24efa7a17a5a363b106960b6a63d8f5c52dabd587522647537c3e4ec4596a8e6ccecedf6920cd74e8eba8c667aa1c020aea4df93df783dbbb2ac1c856f101ccf997e5676c4e729d9a009a2bafe50174a796db12e604fb925c039c3f80931df1a980faa0458d0338ba6a51845159951e4e7bd9c512055b02e54a9ff9d8f070a40114a5ccfcc3feacfe27ca79ed3717566255be506f9679f0a14147ab8049b86d1dca3bcba75d82dd93073", 0xbf}, {&(0x7f0000000880)="b1dff5035708a8ed6d3b59ded2a304794b714a25ed7da40196d87b396bae370d9c12035aa3a9e6e14c2ea81041bb1341c11c566639f3b7603484e04bcdc9fa6e6d2e746a2e3d05bd228fd46e9f2afbe7c1ac85952495a4e25f09a5b564140847a85dc0f30057debc6d1408e4f233f6874561aff66105a383e10f444f30a3b6ebe1d27c5977a9f7d194d26340021581d715568d9604863bb0ac6db062f453aa3f8bf0ae4040dbd2321b7d833405e06847da908cbc439ef403a0599245818ea7d9584765f92945fa497b227446024d0b1e48e1d9243008b790d622ffffedf27ba5a9c4cc9b070f3e5d315606cf77ef", 0xee}, {&(0x7f0000000180)="99e417d16cda6413107595117d7483777b48e41167335e9355428fd4", 0x1c}, {&(0x7f0000000b80)="e82fdb8fb9e77b4142aabb35f7313ff411004e012aed6ac7f3697b70e6bb7a65566d071234b1e31a75a4b2c9e2e33c8ac4b10f90d804dedf2702395b3c1a92f0807257a0209f62b3170ce1cf179799e520d9c1a458f96395aac7064eed9b07a811cbbfb76c369564060caf29c5839738b1df0ce8b133f154add9b51ebf75926ed4758ab3b9dcc3ce5760a59b00f704111dff0a5ee3530efe9b74de1e82c620476e0b149de8e1552c68568eed94bb87a6d737e3677a9c13166716", 0xba}, {&(0x7f00000001c0)="6dd33e823f1452e620d80620cab02fd368c7adde68907d04c4e830ce92d4ab1c73628bc2785e4af17e", 0x29}, {&(0x7f0000000c40)="0af6107132ed3e3c671251c800cd291e39d1af590986a6629114588e16bf03911ffbe7a8196ff70ccd17982b0b08d1f271fe653595c047fe5211995dfabaa9b2c34cf817848eecdbbc9363f83aaa4aba7fb8c6449be7d711968db24c927ab60c0032acd7380943d07676afa9c98dcfef71ebb3731c11e5566bffaf22fdfbf96e260172fc24a8", 0x86}, {&(0x7f0000000480)="2662615318e193af1cf1e4d8c55955074545db68", 0x14}, {&(0x7f0000000d00)="8d2482e8bae3ff9c49e0b9f0be99e65d2cce45c6fbdec6bea2942ff487366e08402942328b0dc8a52efe14f5c69ec340713b80218a43cc07872d456c1e1ff525ab65c0f9e058b511fe998cfbddf16cd8840ab3445440dd036cff94034075949e7ef5c8fec6b2ed7b70b99e25c3b0efa30a3ffcf1da79c8cfc92456efbc036d82b07e523e00e3dfedc88b3e9e88603b260666fe35b338b7d8e5f148a1e39cdff4f170ec58b03b690ccaed19a89b57ebffb893c3e705a9ab85bfd365cfd29fbe5b3015c943b81e5e535a7a9e1a80f00e0b4f90070736f3f173", 0xd8}, {&(0x7f00000004c0)="97240bcf7aaba6e3e5b21023e5a46c2a9c8cc4ee63ea96e72d778aff11c1265a14456e8d854579ffd42163890a64971d", 0x30}], 0xa, &(0x7f0000000680)=[{0x78, 0x0, 0x8, "72f4e901595372b1f33ffbe6dd60e1ff9f7f47ed29571de0350e8f17de3a331e9464e66b4b8b2ba4cff09a0104b8c3f4ab136fdf795d72cccfdaca25358b4e2d2b9cb25368beac49cd7e200aaa49665ddc0ecbe2e8123e10087c9c778e1e0d20f8900ea1"}], 0x78}, 0x20000000) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000f00)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xffffffffffffffca, &(0x7f0000000040)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="000000000000003fb89e40f02cea", 0x0, 0x102}, 0x28) 03:30:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="0000000000000000b89e40", 0x0, 0x102}, 0x28) 03:30:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x4ff8, 0x80004) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x8000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x3070000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="0000000000000000b89e40", 0x0, 0x102}, 0x28) 03:30:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000040b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(r1, &(0x7f0000000640)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x8001, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x10100, 0x0) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000400)={r4, 0x0, 0x2000, 0x1000000000000}) 03:30:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x3f000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000060b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="0000000000000000b89e40", 0x0, 0x102}, 0x28) 03:30:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x40000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:08 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00000000fffffffeb89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02c", 0x0, 0x102}, 0x28) 03:30:09 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000880)={0x90, 0x0, 0x6, {0x1, 0x1, 0x7, 0x1, 0x7, 0x800, {0x0, 0xc59b, 0x9, 0x7, 0x61, 0x73f, 0x7, 0xffff, 0x8001, 0x3ff, 0xfffffffffffffffb, r1, r2, 0x9, 0x80000001}}}, 0x90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="008000a0ffffffffb89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x60000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02c", 0x0, 0x102}, 0x28) 03:30:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x3d6517acf350e5c3, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000003c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00f0ffffffffffffb89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xa0008000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02c", 0x0, 0x102}, 0x28) 03:30:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xfe0b) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:09 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000001029e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0}, 0x28) 03:30:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xfeffffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fsync(r1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000280)={'caif0\x00', {0x2, 0x4e24, @local}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0}, 0x28) 03:30:10 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0002000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xfffff000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0}, 0x28) 03:30:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0060000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fsync(r1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000280)={'caif0\x00', {0x2, 0x4e24, @local}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00f0000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e87460"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x8000a0ffffffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) r2 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x3f, 0x400) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f00000003c0), &(0x7f0000000400)=0x4) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bind$packet(r2, &(0x7f0000000440)={0x11, 0xf8, r1, 0x1, 0xc45, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) ioctl$NBD_SET_SOCK(r2, 0xab00, r2) 03:30:11 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0007030000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fsync(r1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000280)={'caif0\x00', {0x2, 0x4e24, @local}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x321000, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x2, r3}) 03:30:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0003070000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fsync(r1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000280)={'caif0\x00', {0x2, 0x4e24, @local}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xf0ffffffffffff, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x9a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0000000000000003a4f0ff00000000b7060000ffffffff2d64050000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701332a0e1b4d9ee1c5aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb10938203cbad80f8fb2211e287c98a84868b5e52dade2738d390ffd0a58e030a9de73227b0463f66540a371b310d8982fbe8b8137fb2c47e4b7b762badf13c0a81265d768f163f59e72d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00003f0000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000280)={0xffff, 0x756, 0x200, 0x20, 0x4}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:30:12 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000400000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0xee75e14e359306c, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f00000003c0)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x100000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000600000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb1093"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000f00)=ANY=[@ANYBLOB="b702000003070000bfa3000000000000070300002e00ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aed64f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f000cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602ba017cf8a08e96a5e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4cc69ac3e6d80bfb67e8942121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfd2dc722d49fd9268173fc48e73c75b505a552621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb1093829f60ea7b952201e32fa7c944ac8bacaa6b0000000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x400081, 0x0) syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x4c1, 0x100) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) process_vm_readv(r3, &(0x7f0000000880), 0x0, &(0x7f0000000e00)=[{&(0x7f0000000ec0)=""/52, 0x34}, {&(0x7f0000000900)=""/48, 0x30}, {&(0x7f0000000bc0)=""/148, 0x94}, {&(0x7f0000000940)=""/22, 0x16}, {&(0x7f0000000c80)=""/83, 0x53}, {&(0x7f0000000d00)=""/241, 0xf1}], 0x6, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000004c0), &(0x7f0000000680)=0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0xffffffffffffeffa) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@int=0xa2, 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x18) 03:30:12 executing program 0 (fault-call:8 fault-nth:0): socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000f00000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x200000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 830.284068][T26653] FAULT_INJECTION: forcing a failure. [ 830.284068][T26653] name failslab, interval 1, probability 0, space 0, times 0 03:30:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 830.429914][T26653] CPU: 0 PID: 26653 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #126 [ 830.439953][T26653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.439959][T26653] Call Trace: [ 830.439993][T26653] dump_stack+0x172/0x1f0 [ 830.440011][T26653] should_fail.cold+0xa/0x15 [ 830.440027][T26653] ? fault_create_debugfs_attr+0x180/0x180 [ 830.440042][T26653] ? page_to_nid.part.0+0x20/0x20 [ 830.440060][T26653] ? ___might_sleep+0x163/0x280 [ 830.440079][T26653] __should_failslab+0x121/0x190 [ 830.440099][T26653] should_failslab+0x9/0x14 [ 830.490889][T26653] __kmalloc+0x2e0/0x770 [ 830.490902][T26653] ? __fget+0xa3/0x560 [ 830.490921][T26653] ? bpf_test_init.isra.0+0x95/0x100 [ 830.490939][T26653] bpf_test_init.isra.0+0x95/0x100 [ 830.517026][T26653] bpf_prog_test_run_skb+0x10f/0x1310 [ 830.522962][T26653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 830.529962][T26653] ? cap_capable+0x205/0x270 [ 830.535613][T26653] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 830.535631][T26653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 830.535652][T26653] ? fput_many+0x12c/0x1a0 [ 830.554868][T26653] ? fput+0x1b/0x20 [ 830.560634][T26653] ? __bpf_prog_get+0x97/0x290 [ 830.566714][T26653] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 830.574355][T26653] __do_sys_bpf+0x1668/0x3460 [ 830.579955][T26653] ? bpf_prog_load+0x1670/0x1670 [ 830.585505][T26653] ? __kasan_check_write+0x14/0x20 [ 830.592055][T26653] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 830.598565][T26653] ? wait_for_completion+0x440/0x440 [ 830.604715][T26653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 830.612258][T26653] ? fput_many+0x12c/0x1a0 [ 830.617587][T26653] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.624297][T26653] __x64_sys_bpf+0x73/0xb0 [ 830.629849][T26653] do_syscall_64+0xfd/0x6a0 [ 830.634700][T26653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.642708][T26653] RIP: 0033:0x459879 [ 830.646711][T26653] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:30:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 830.671799][T26653] RSP: 002b:00007f616d314c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 830.682177][T26653] RAX: ffffffffffffffda RBX: 00007f616d314c90 RCX: 0000000000459879 [ 830.691403][T26653] RDX: 0000000000000028 RSI: 0000000020000380 RDI: 000000000000000a [ 830.701040][T26653] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 830.710366][T26653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f616d3156d4 [ 830.719315][T26653] R13: 00000000004bfbf2 R14: 00000000004d18b8 R15: 0000000000000005 03:30:13 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00a0008000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f00000003c0)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 0 (fault-call:8 fault-nth:1): socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x307000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="00fffff000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 831.202242][T26804] FAULT_INJECTION: forcing a failure. [ 831.202242][T26804] name failslab, interval 1, probability 0, space 0, times 0 [ 831.234596][T26804] CPU: 1 PID: 26804 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #126 [ 831.243474][T26804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.254856][T26804] Call Trace: [ 831.259670][T26804] dump_stack+0x172/0x1f0 [ 831.265241][T26804] should_fail.cold+0xa/0x15 [ 831.270455][T26804] ? fault_create_debugfs_attr+0x180/0x180 [ 831.277263][T26804] ? page_to_nid.part.0+0x20/0x20 [ 831.283173][T26804] ? ___might_sleep+0x163/0x280 [ 831.289592][T26804] __should_failslab+0x121/0x190 [ 831.295252][T26804] should_failslab+0x9/0x14 [ 831.300035][T26804] kmem_cache_alloc_trace+0x2d3/0x790 [ 831.305944][T26804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.312795][T26804] ? bpf_test_init.isra.0+0x6d/0x100 [ 831.318246][T26804] bpf_prog_test_run_skb+0x2c7/0x1310 [ 831.324251][T26804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.330935][T26804] ? cap_capable+0x205/0x270 [ 831.335617][T26804] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 831.341493][T26804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.348357][T26804] ? fput_many+0x12c/0x1a0 [ 831.352920][T26804] ? fput+0x1b/0x20 [ 831.356996][T26804] ? __bpf_prog_get+0x97/0x290 [ 831.362926][T26804] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 831.369430][T26804] __do_sys_bpf+0x1668/0x3460 [ 831.374225][T26804] ? bpf_prog_load+0x1670/0x1670 [ 831.379850][T26804] ? __kasan_check_write+0x14/0x20 [ 831.385770][T26804] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 831.391999][T26804] ? wait_for_completion+0x440/0x440 [ 831.398689][T26804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.406705][T26804] ? fput_many+0x12c/0x1a0 [ 831.411882][T26804] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 831.418229][T26804] __x64_sys_bpf+0x73/0xb0 [ 831.423263][T26804] do_syscall_64+0xfd/0x6a0 [ 831.428390][T26804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.434946][T26804] RIP: 0033:0x459879 [ 831.439118][T26804] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.461838][T26804] RSP: 002b:00007f616d2f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 831.471036][T26804] RAX: ffffffffffffffda RBX: 00007f616d2f3c90 RCX: 0000000000459879 [ 831.480063][T26804] RDX: 0000000000000028 RSI: 0000000020000380 RDI: 000000000000000a [ 831.490306][T26804] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 03:30:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r1, 0xc0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x9, 0x5, 0x203}, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x9}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, r3}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x102}, 0x28) [ 831.499911][T26804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f616d2f46d4 [ 831.518084][T26804] R13: 00000000004bfbf2 R14: 00000000004d18b8 R15: 0000000000000005 03:30:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:14 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000001000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:14 executing program 0 (fault-call:8 fault-nth:2): socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x3f00000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000480)=0x100000001) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x2}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1ff}, 0x8) fstat(0xffffffffffffffff, &(0x7f0000000800)) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000004c0)={0xfffffffffffffffc, 0xffff}, 0x2) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xd) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 831.875480][T26928] FAULT_INJECTION: forcing a failure. [ 831.875480][T26928] name failslab, interval 1, probability 0, space 0, times 0 [ 831.951057][T26928] CPU: 0 PID: 26928 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #126 [ 831.960493][T26928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.972274][T26928] Call Trace: [ 831.975743][T26928] dump_stack+0x172/0x1f0 [ 831.980525][T26928] should_fail.cold+0xa/0x15 [ 831.985321][T26928] ? fault_create_debugfs_attr+0x180/0x180 [ 831.991541][T26928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.998974][T26928] ? should_fail+0x1de/0x852 [ 832.004021][T26928] __should_failslab+0x121/0x190 [ 832.009153][T26928] should_failslab+0x9/0x14 [ 832.014606][T26928] kmem_cache_alloc+0x47/0x710 [ 832.020084][T26928] ? lockdep_init_map+0x1be/0x6d0 [ 832.026471][T26928] ? lockdep_init_map+0x1be/0x6d0 [ 832.032308][T26928] __build_skb+0x26/0x70 [ 832.037040][T26928] build_skb+0x21/0x190 [ 832.041582][T26928] bpf_prog_test_run_skb+0x37a/0x1310 [ 832.047330][T26928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.054391][T26928] ? cap_capable+0x205/0x270 [ 832.059257][T26928] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 832.065802][T26928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.072413][T26928] ? fput_many+0x12c/0x1a0 [ 832.077096][T26928] ? fput+0x1b/0x20 [ 832.081000][T26928] ? __bpf_prog_get+0x97/0x290 [ 832.086132][T26928] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 832.091880][T26928] __do_sys_bpf+0x1668/0x3460 [ 832.097098][T26928] ? bpf_prog_load+0x1670/0x1670 [ 832.102457][T26928] ? __kasan_check_write+0x14/0x20 [ 832.107923][T26928] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 832.114479][T26928] ? wait_for_completion+0x440/0x440 [ 832.120740][T26928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.127319][T26928] ? fput_many+0x12c/0x1a0 [ 832.132709][T26928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 832.139729][T26928] __x64_sys_bpf+0x73/0xb0 [ 832.145036][T26928] do_syscall_64+0xfd/0x6a0 [ 832.150092][T26928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.156562][T26928] RIP: 0033:0x459879 [ 832.160774][T26928] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.181991][T26928] RSP: 002b:00007f616d314c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 832.191251][T26928] RAX: ffffffffffffffda RBX: 00007f616d314c90 RCX: 0000000000459879 03:30:15 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000002000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 832.200156][T26928] RDX: 0000000000000028 RSI: 0000000020000380 RDI: 000000000000000a [ 832.208406][T26928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 832.216654][T26928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f616d3156d4 [ 832.224980][T26928] R13: 00000000004bfbf2 R14: 00000000004d18b8 R15: 0000000000000005 03:30:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) r1 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x2, 0x1) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000680)={0x0, {0xffffffffffffc27c, 0x2}}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/150}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) r3 = syz_open_dev$dmmidi(&(0x7f0000000880)='/dev/dmmidi#\x00', 0x0, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000008c0)={0x0, 0x365, 0x7fffffff, 0x5}, &(0x7f0000000900)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000940)=@assoc_value={r4, 0x6}, 0x8) 03:30:15 executing program 0 (fault-call:8 fault-nth:3): socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb109382"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000703000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x4000000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x20401, 0x0) clock_gettime(0x0, &(0x7f0000003640)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000880)=[{&(0x7f00000009c0)=""/213, 0xd5}, {&(0x7f0000000ac0)=""/252, 0xfc}, {&(0x7f00000004c0)=""/36, 0x24}], 0x3, &(0x7f00000038c0)=""/4096, 0x1000}, 0x1}], 0x1, 0x22, 0x0) recvmmsg(r0, &(0x7f0000003580)=[{{&(0x7f00000003c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000e00)=""/191, 0xbf}, 0x1000008}, {{0x0, 0x12a, &(0x7f0000003780)=[{&(0x7f0000000ec0)=""/145, 0x91}, {&(0x7f0000000f80)=""/97, 0x61}, {&(0x7f0000001000)=""/157, 0x9d}, {&(0x7f0000000680)=""/38, 0x26}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f00000030c0)=""/195, 0xc3}], 0x7, &(0x7f0000000940)=""/18, 0x12}, 0xda}, {{&(0x7f0000003240), 0x80, &(0x7f0000003480)=[{&(0x7f00000032c0)=""/91, 0x5b}, {&(0x7f0000003800)=""/149, 0x95}, {&(0x7f0000003400)=""/81, 0x51}], 0x3, &(0x7f00000034c0)=""/185, 0x43}, 0x8}], 0x3, 0x40, &(0x7f0000003680)={r2, r3+10000000}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000036c0)={@ipv4={[], [], @loopback}, 0x62, r4}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="000000003f000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x6000000000000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 832.847843][T27079] FAULT_INJECTION: forcing a failure. [ 832.847843][T27079] name failslab, interval 1, probability 0, space 0, times 0 [ 832.862377][T27079] CPU: 0 PID: 27079 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #126 [ 832.871542][T27079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.882667][T27079] Call Trace: [ 832.886261][T27079] dump_stack+0x172/0x1f0 [ 832.891071][T27079] should_fail.cold+0xa/0x15 03:30:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 832.896226][T27079] ? fault_create_debugfs_attr+0x180/0x180 [ 832.902879][T27079] ? __kasan_check_read+0x11/0x20 [ 832.908363][T27079] __should_failslab+0x121/0x190 [ 832.914185][T27079] should_failslab+0x9/0x14 [ 832.919481][T27079] kmem_cache_alloc_node_trace+0x5a/0x750 [ 832.925845][T27079] ? __this_cpu_preempt_check+0x3a/0x210 [ 832.931779][T27079] __kmalloc_node_track_caller+0x3d/0x70 [ 832.938257][T27079] __kmalloc_reserve.isra.0+0x40/0xf0 [ 832.943881][T27079] pskb_expand_head+0x151/0xe00 [ 832.949171][T27079] bpf_skb_change_head+0x5dd/0x930 [ 832.954858][T27079] bpf_prog_0198d73af6bd5849+0x633/0x1000 [ 832.960823][T27079] ? skb_zerocopy_headlen+0x18/0x210 [ 832.966537][T27079] ? build_skb+0x21/0x190 [ 832.970875][T27079] ? bpf_prog_test_run_skb+0x37a/0x1310 [ 832.976623][T27079] ? __do_sys_bpf+0x1668/0x3460 [ 832.981794][T27079] ? __x64_sys_bpf+0x73/0xb0 [ 832.986673][T27079] ? do_syscall_64+0xfd/0x6a0 [ 832.991940][T27079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.998523][T27079] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 833.004827][T27079] ? __this_cpu_preempt_check+0x3a/0x210 [ 833.011114][T27079] ? bpf_test_run+0x188/0xac0 [ 833.016027][T27079] ? __kasan_check_read+0x11/0x20 [ 833.021649][T27079] ? lock_downgrade+0x920/0x920 [ 833.026888][T27079] ? lock_acquire+0x190/0x410 [ 833.032383][T27079] ? bpf_test_run+0x188/0xac0 [ 833.038047][T27079] ? trace_hardirqs_on+0x67/0x240 [ 833.043361][T27079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 833.049674][T27079] ? ktime_get+0x202/0x2f0 [ 833.054513][T27079] bpf_test_run+0x31f/0xac0 [ 833.059476][T27079] ? copy_overflow+0x30/0x30 [ 833.064561][T27079] ? __build_skb+0x58/0x70 [ 833.069450][T27079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.075974][T27079] bpf_prog_test_run_skb+0x939/0x1310 [ 833.081538][T27079] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 833.087272][T27079] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 833.094098][T27079] ? fput_many+0x12c/0x1a0 [ 833.098659][T27079] ? fput+0x1b/0x20 [ 833.103188][T27079] ? __bpf_prog_get+0x97/0x290 [ 833.108266][T27079] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 833.114823][T27079] __do_sys_bpf+0x1668/0x3460 [ 833.119794][T27079] ? __this_cpu_preempt_check+0x3a/0x210 [ 833.126143][T27079] ? bpf_prog_load+0x1670/0x1670 [ 833.131178][T27079] ? __kasan_check_write+0x14/0x20 [ 833.136464][T27079] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 833.142386][T27079] ? wait_for_completion+0x440/0x440 [ 833.148052][T27079] ? retint_kernel+0x2b/0x2b [ 833.152738][T27079] ? trace_hardirqs_on_caller+0x6a/0x240 [ 833.158764][T27079] __x64_sys_bpf+0x73/0xb0 [ 833.163305][T27079] ? do_syscall_64+0x5b/0x6a0 [ 833.168236][T27079] do_syscall_64+0xfd/0x6a0 [ 833.172959][T27079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.178930][T27079] RIP: 0033:0x459879 [ 833.182919][T27079] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.203443][T27079] RSP: 002b:00007f616d2f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 833.212132][T27079] RAX: ffffffffffffffda RBX: 00007f616d2f3c90 RCX: 0000000000459879 [ 833.221093][T27079] RDX: 0000000000000028 RSI: 0000000020000380 RDI: 000000000000000a [ 833.229332][T27079] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 833.238082][T27079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f616d2f46d4 [ 833.246422][T27079] R13: 00000000004bfbf2 R14: 00000000004d18b8 R15: 0000000000000005 03:30:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 0 (fault-call:8 fault-nth:4): socket$inet(0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000880)={[], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm_plock\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r2}}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xfeffffff00000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/432], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 3: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000040000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000680)='mode', 0xffffffffffffffff}, 0x30) setpriority(0x1, r6, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) geteuid() mount$bpf(0x0, 0x0, &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1ef6d3c6958da4bddac602e0048bec11e874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc48e73c75b505b852621ad19c854622f7c7d79ec3ab4494353b9f6b822211eb1aa48cfcaebb1093"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0xfffffffffffffffc) r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x7, 0x8000) r2 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000400)=0x8000, 0x4) fstat(0xffffffffffffffff, &(0x7f0000000800)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = syz_open_dev$swradio(&(0x7f0000000d40)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SIOCX25SENDCALLACCPT(r4, 0x89e9) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r5, r1, 0x0, 0xfffffffffffffe3a, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm_plock\x00', 0x200940, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000800)) r4 = geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x44040, &(0x7f0000000880)={[{@mode={'mode'}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid'}}, {@fowner_gt={'fowner>'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setpriority(0x1, 0x0, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) 03:30:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) fstat(r0, &(0x7f0000000800)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0xffffffff00000000, &(0x7f00000006c0)="0000000000000000b89e40f02cea", 0x0, 0x102}, 0x28) [ 833.817999][T10040] WARNING: CPU: 0 PID: 10040 at kernel/bpf/core.c:851 bpf_jit_free+0x157/0x1b0 [ 833.827331][T10040] Kernel panic - not syncing: panic_on_warn set ... [ 833.834557][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 833.843267][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.850089][ T3906] kobject: 'loop4' (000000007e0bda57): kobject_uevent_env [ 833.853952][T10040] Workqueue: events bpf_prog_free_deferred [ 833.853960][T10040] Call Trace: [ 833.853988][T10040] dump_stack+0x172/0x1f0 [ 833.876764][T10040] ? bpf_jit_free+0x70/0x1b0 [ 833.881583][T10040] panic+0x2dc/0x755 [ 833.885715][T10040] ? add_taint.cold+0x16/0x16 [ 833.890798][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 833.898966][T10040] #PF: supervisor read access in kernel mode [ 833.900034][ T3906] kobject: 'loop4' (000000007e0bda57): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 833.905190][T10040] #PF: error_code(0x0000) - not-present page [ 833.905196][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 833.905222][T10040] Oops: 0000 [#1] PREEMPT SMP KASAN [ 833.905236][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 833.905243][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.905266][T10040] Workqueue: events bpf_prog_free_deferred [ 833.961054][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 833.967737][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 833.989940][T10040] RSP: 0018:ffff888088227850 EFLAGS: 00010806 [ 833.996730][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 834.005838][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 834.014687][T10040] RBP: ffff888088227890 R08: ffff88808821a480 R09: 0000000000000000 [ 834.023806][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 834.032383][T10040] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff888094117078 [ 834.040846][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 834.050622][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 834.058153][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 834.066896][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 834.076630][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 834.085385][T10040] Call Trace: [ 834.088878][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 834.097113][T10040] #PF: supervisor read access in kernel mode [ 834.103620][T10040] #PF: error_code(0x0000) - not-present page [ 834.109904][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 834.118108][T10040] Oops: 0000 [#2] PREEMPT SMP KASAN [ 834.123863][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 834.131982][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.142437][T10040] Workqueue: events bpf_prog_free_deferred [ 834.148517][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 834.155620][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 834.175951][T10040] RSP: 0018:ffff888088227378 EFLAGS: 00010806 [ 834.182691][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 834.190893][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 834.199302][T10040] RBP: ffff8880882273b8 R08: ffff88808821a480 R09: 0000000000000000 [ 834.207536][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 834.216278][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 834.224966][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 834.234231][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 834.241254][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 834.249966][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 834.258245][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 834.266436][T10040] Call Trace: [ 834.269759][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 834.277809][T10040] #PF: supervisor read access in kernel mode [ 834.284230][T10040] #PF: error_code(0x0000) - not-present page [ 834.291056][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 834.298893][T10040] Oops: 0000 [#3] PREEMPT SMP KASAN [ 834.304269][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 834.312301][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.323014][T10040] Workqueue: events bpf_prog_free_deferred [ 834.329110][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 834.335624][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 834.356101][T10040] RSP: 0018:ffff888088226e98 EFLAGS: 00010806 [ 834.362746][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 834.371629][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 834.379858][T10040] RBP: ffff888088226ed8 R08: ffff88808821a480 R09: 0000000000000000 [ 834.388019][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 834.396741][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 834.405162][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 834.414466][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 834.421902][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 834.430070][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 834.438430][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 834.446942][T10040] Call Trace: [ 834.450256][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 834.458526][T10040] #PF: supervisor read access in kernel mode [ 834.464627][T10040] #PF: error_code(0x0000) - not-present page [ 834.470691][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 834.478524][T10040] Oops: 0000 [#4] PREEMPT SMP KASAN [ 834.484085][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 834.492081][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.502802][T10040] Workqueue: events bpf_prog_free_deferred [ 834.508722][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 834.514991][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 834.535110][T10040] RSP: 0018:ffff8880882269b8 EFLAGS: 00010806 [ 834.541354][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 834.549337][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 834.557624][T10040] RBP: ffff8880882269f8 R08: ffff88808821a480 R09: 0000000000000000 [ 834.566109][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 834.574305][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 834.582466][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 834.591516][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 834.598452][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 834.606960][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 834.615284][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 834.623518][T10040] Call Trace: [ 834.627092][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 834.635324][T10040] #PF: supervisor read access in kernel mode [ 834.641583][T10040] #PF: error_code(0x0000) - not-present page [ 834.648167][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 834.656003][T10040] Oops: 0000 [#5] PREEMPT SMP KASAN [ 834.661511][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 834.669512][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.679589][T10040] Workqueue: events bpf_prog_free_deferred [ 834.685508][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 834.692033][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 834.712376][T10040] RSP: 0018:ffff8880882264d8 EFLAGS: 00010806 [ 834.718735][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 834.726972][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 834.735025][T10040] RBP: ffff888088226518 R08: ffff88808821a480 R09: 0000000000000000 [ 834.743208][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 834.751292][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 834.759391][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 834.768555][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 834.775140][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 834.783379][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 834.791453][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 834.799502][T10040] Call Trace: [ 834.803006][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 834.810820][T10040] #PF: supervisor read access in kernel mode [ 834.817052][T10040] #PF: error_code(0x0000) - not-present page [ 834.823212][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 834.830848][T10040] Oops: 0000 [#6] PREEMPT SMP KASAN [ 834.836044][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 834.843910][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.853982][T10040] Workqueue: events bpf_prog_free_deferred [ 834.859818][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 834.866188][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 834.886606][T10040] RSP: 0018:ffff888088225ff8 EFLAGS: 00010806 [ 834.892765][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 834.900902][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 834.908963][T10040] RBP: ffff888088226038 R08: ffff88808821a480 R09: 0000000000000000 [ 834.917042][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 834.925010][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 834.932977][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 834.941899][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 834.948670][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 834.956728][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 834.964836][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 834.972883][T10040] Call Trace: [ 834.976394][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 834.984108][T10040] #PF: supervisor read access in kernel mode [ 834.990164][T10040] #PF: error_code(0x0000) - not-present page [ 834.996232][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 835.003783][T10040] Oops: 0000 [#7] PREEMPT SMP KASAN [ 835.009245][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 835.017309][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.027735][T10040] Workqueue: events bpf_prog_free_deferred [ 835.033729][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 835.040137][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 835.059940][T10040] RSP: 0018:ffff888088225b18 EFLAGS: 00010806 [ 835.066001][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 835.074155][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 835.082215][T10040] RBP: ffff888088225b58 R08: ffff88808821a480 R09: 0000000000000000 [ 835.090187][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 835.098334][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 835.106393][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 835.115601][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 835.122283][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 835.130528][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 835.138836][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 835.146901][T10040] Call Trace: [ 835.150210][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 835.158276][T10040] #PF: supervisor read access in kernel mode [ 835.164240][T10040] #PF: error_code(0x0000) - not-present page [ 835.170217][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 835.177990][T10040] Oops: 0000 [#8] PREEMPT SMP KASAN [ 835.183188][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 835.191075][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.201138][T10040] Workqueue: events bpf_prog_free_deferred [ 835.207258][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 835.213496][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 835.233370][T10040] RSP: 0018:ffff888088225638 EFLAGS: 00010806 [ 835.239533][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 835.247603][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 835.255574][T10040] RBP: ffff888088225678 R08: ffff88808821a480 R09: 0000000000000000 [ 835.263625][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 835.271866][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 835.280029][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 835.289053][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 835.295631][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 835.303799][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 835.311941][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 835.320198][T10040] Call Trace: [ 835.323587][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 835.331537][T10040] #PF: supervisor read access in kernel mode [ 835.337503][T10040] #PF: error_code(0x0000) - not-present page [ 835.343915][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 835.351554][T10040] Oops: 0000 [#9] PREEMPT SMP KASAN [ 835.356866][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 835.365135][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.375194][T10040] Workqueue: events bpf_prog_free_deferred [ 835.381259][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 835.387405][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 835.407803][T10040] RSP: 0018:ffff888088225158 EFLAGS: 00010806 [ 835.413977][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 835.422213][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 835.430270][T10040] RBP: ffff888088225198 R08: ffff88808821a480 R09: 0000000000000000 [ 835.438238][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 835.446225][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 835.454197][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 835.463324][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 835.469902][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 835.477881][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 835.485866][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 835.493828][T10040] Call Trace: [ 835.497135][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 835.504836][T10040] #PF: supervisor read access in kernel mode [ 835.518471][T10040] #PF: error_code(0x0000) - not-present page [ 835.524648][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 835.532299][T10040] Oops: 0000 [#10] PREEMPT SMP KASAN [ 835.537581][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 835.545571][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.555915][T10040] Workqueue: events bpf_prog_free_deferred [ 835.561901][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 835.568313][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 835.588102][T10040] RSP: 0018:ffff888088224c78 EFLAGS: 00010806 [ 835.594163][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 835.602131][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 835.610367][T10040] RBP: ffff888088224cb8 R08: ffff88808821a480 R09: 0000000000000000 [ 835.618330][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 835.626474][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 835.634531][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 835.643465][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 835.650287][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 835.658256][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 835.666225][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 835.674274][T10040] Call Trace: [ 835.677585][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 835.685377][T10040] #PF: supervisor read access in kernel mode [ 835.691345][T10040] #PF: error_code(0x0000) - not-present page [ 835.697318][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 835.704956][T10040] Oops: 0000 [#11] PREEMPT SMP KASAN [ 835.710243][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 835.718266][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.728434][T10040] Workqueue: events bpf_prog_free_deferred [ 835.734358][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 835.740503][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 835.760715][T10040] RSP: 0018:ffff888088224798 EFLAGS: 00010806 [ 835.766863][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 835.775014][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 835.783130][T10040] RBP: ffff8880882247d8 R08: ffff88808821a480 R09: 0000000000000000 [ 835.791191][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 835.799261][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 835.807235][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 835.816155][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 835.822817][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 835.830874][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 835.839011][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 835.847106][T10040] Call Trace: [ 835.850417][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 835.858119][T10040] #PF: supervisor read access in kernel mode [ 835.864170][T10040] #PF: error_code(0x0000) - not-present page [ 835.870133][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 835.877683][T10040] Oops: 0000 [#12] PREEMPT SMP KASAN [ 835.883154][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 835.891056][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.901257][T10040] Workqueue: events bpf_prog_free_deferred [ 835.907333][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 835.913478][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 835.933284][T10040] RSP: 0018:ffff8880882242b8 EFLAGS: 00010806 [ 835.939374][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 835.947425][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 835.955481][T10040] RBP: ffff8880882242f8 R08: ffff88808821a480 R09: 0000000000000000 [ 835.963530][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 835.971718][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 835.980120][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 835.989418][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 835.996120][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 836.004175][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 836.012424][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 836.020384][T10040] Call Trace: [ 836.023692][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 836.031392][T10040] #PF: supervisor read access in kernel mode [ 836.037716][T10040] #PF: error_code(0x0000) - not-present page [ 836.043682][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 836.051671][T10040] Oops: 0000 [#13] PREEMPT SMP KASAN [ 836.057168][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 836.064964][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.075026][T10040] Workqueue: events bpf_prog_free_deferred [ 836.080916][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 836.087079][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 836.106911][T10040] RSP: 0018:ffff888088223dd8 EFLAGS: 00010806 [ 836.112969][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 836.121107][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 836.129159][T10040] RBP: ffff888088223e18 R08: ffff88808821a480 R09: 0000000000000000 [ 836.137129][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 836.145184][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 836.153343][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 836.162500][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 836.169093][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 836.177321][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 836.185497][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 836.193593][T10040] Call Trace: [ 836.197089][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 836.204884][T10040] #PF: supervisor read access in kernel mode [ 836.211024][T10040] #PF: error_code(0x0000) - not-present page [ 836.217100][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 836.224842][T10040] Oops: 0000 [#14] PREEMPT SMP KASAN [ 836.230745][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 836.238797][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.248947][T10040] Workqueue: events bpf_prog_free_deferred [ 836.254758][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 836.260906][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 836.280689][T10040] RSP: 0018:ffff8880882238f8 EFLAGS: 00010806 [ 836.286752][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 836.294901][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 836.302871][T10040] RBP: ffff888088223938 R08: ffff88808821a480 R09: 0000000000000000 [ 836.310839][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 836.318823][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 836.327258][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 836.336263][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 836.343190][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 836.351161][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 836.359257][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 836.367243][T10040] Call Trace: [ 836.371009][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 836.378828][T10040] #PF: supervisor read access in kernel mode [ 836.384885][T10040] #PF: error_code(0x0000) - not-present page [ 836.390856][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 836.398502][T10040] Oops: 0000 [#15] PREEMPT SMP KASAN [ 836.404045][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 836.411842][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.422230][T10040] Workqueue: events bpf_prog_free_deferred [ 836.428034][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 836.434183][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 836.453960][T10040] RSP: 0018:ffff888088223418 EFLAGS: 00010806 [ 836.460020][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 836.468283][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 836.476334][T10040] RBP: ffff888088223458 R08: ffff88808821a480 R09: 0000000000000000 [ 836.484486][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 836.492468][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 836.500530][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 836.509549][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 836.516216][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 836.524217][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 836.532274][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 836.540326][T10040] Call Trace: [ 836.543744][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 836.551681][T10040] #PF: supervisor read access in kernel mode [ 836.557737][T10040] #PF: error_code(0x0000) - not-present page [ 836.563790][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 836.571540][T10040] Oops: 0000 [#16] PREEMPT SMP KASAN [ 836.576817][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 836.584915][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.595063][T10040] Workqueue: events bpf_prog_free_deferred [ 836.600969][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 836.607121][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 836.627228][T10040] RSP: 0018:ffff888088222f38 EFLAGS: 00010806 [ 836.633407][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 836.641370][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 836.649872][T10040] RBP: ffff888088222f78 R08: ffff88808821a480 R09: 0000000000000000 [ 836.657841][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 836.666675][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 836.674980][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 836.684015][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 836.690660][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 836.698904][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 836.707311][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 836.715744][T10040] Call Trace: [ 836.719238][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 836.727029][T10040] #PF: supervisor read access in kernel mode [ 836.733196][T10040] #PF: error_code(0x0000) - not-present page [ 836.739407][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 836.747224][T10040] Oops: 0000 [#17] PREEMPT SMP KASAN [ 836.752533][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 836.760324][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.770557][T10040] Workqueue: events bpf_prog_free_deferred [ 836.776475][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 836.782722][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 836.802613][T10040] RSP: 0018:ffff888088222a58 EFLAGS: 00010806 [ 836.808870][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 836.816851][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 836.824987][T10040] RBP: ffff888088222a98 R08: ffff88808821a480 R09: 0000000000000000 [ 836.833138][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 836.841102][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 836.849162][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 836.858254][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 836.864923][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 836.873108][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 836.881334][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 836.889294][T10040] Call Trace: [ 836.892696][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 836.900569][T10040] #PF: supervisor read access in kernel mode [ 836.906625][T10040] #PF: error_code(0x0000) - not-present page [ 836.912679][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 836.920489][T10040] Oops: 0000 [#18] PREEMPT SMP KASAN [ 836.925853][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 836.933831][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.943892][T10040] Workqueue: events bpf_prog_free_deferred [ 836.949897][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 836.956226][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 836.976168][T10040] RSP: 0018:ffff888088222578 EFLAGS: 00010806 [ 836.982330][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 836.990291][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 836.998502][T10040] RBP: ffff8880882225b8 R08: ffff88808821a480 R09: 0000000000000000 [ 837.006556][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 837.014607][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 837.022575][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 837.031743][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.038409][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 837.046417][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.054382][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.062593][T10040] Call Trace: [ 837.065894][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 837.073613][T10040] #PF: supervisor read access in kernel mode [ 837.079670][T10040] #PF: error_code(0x0000) - not-present page [ 837.085816][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 837.093485][T10040] Oops: 0000 [#19] PREEMPT SMP KASAN [ 837.098779][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 837.106881][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.117304][T10040] Workqueue: events bpf_prog_free_deferred [ 837.123383][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 837.129549][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 837.149151][T10040] RSP: 0018:ffff888088222098 EFLAGS: 00010806 [ 837.155219][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 837.163362][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 837.171328][T10040] RBP: ffff8880882220d8 R08: ffff88808821a480 R09: 0000000000000000 [ 837.179377][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 837.187546][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 837.195778][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 837.204784][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.211474][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 837.219543][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.227900][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.235973][T10040] Call Trace: [ 837.239365][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 837.247255][T10040] #PF: supervisor read access in kernel mode [ 837.253358][T10040] #PF: error_code(0x0000) - not-present page [ 837.259349][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 837.267235][T10040] Oops: 0000 [#20] PREEMPT SMP KASAN [ 837.273053][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 837.281065][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.291308][T10040] Workqueue: events bpf_prog_free_deferred [ 837.297202][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 837.303349][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 837.323637][T10040] RSP: 0018:ffff888088221bb8 EFLAGS: 00010806 [ 837.329784][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 837.337960][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 837.346185][T10040] RBP: ffff888088221bf8 R08: ffff88808821a480 R09: 0000000000000000 [ 837.354436][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 837.362855][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 837.371085][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 837.380327][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.387076][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 837.395216][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.403355][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.411835][T10040] Call Trace: [ 837.415163][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 837.422963][T10040] #PF: supervisor read access in kernel mode [ 837.428927][T10040] #PF: error_code(0x0000) - not-present page [ 837.435353][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 837.443183][T10040] Oops: 0000 [#21] PREEMPT SMP KASAN [ 837.448481][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 837.456377][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.466704][T10040] Workqueue: events bpf_prog_free_deferred [ 837.472598][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 837.478745][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 837.498754][T10040] RSP: 0018:ffff8880882216d8 EFLAGS: 00010806 [ 837.504813][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 837.521277][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 837.529420][T10040] RBP: ffff888088221718 R08: ffff88808821a480 R09: 0000000000000000 [ 837.537486][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 837.545601][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 837.553756][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 837.563032][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.570054][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 837.578383][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.586435][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.594398][T10040] Call Trace: [ 837.597787][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 837.605509][T10040] #PF: supervisor read access in kernel mode [ 837.611569][T10040] #PF: error_code(0x0000) - not-present page [ 837.617566][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 837.625117][T10040] Oops: 0000 [#22] PREEMPT SMP KASAN [ 837.630657][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 837.638805][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.649062][T10040] Workqueue: events bpf_prog_free_deferred [ 837.654889][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 837.661145][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 837.681006][T10040] RSP: 0018:ffff8880882211f8 EFLAGS: 00010806 [ 837.687154][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 837.695125][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 837.703406][T10040] RBP: ffff888088221238 R08: ffff88808821a480 R09: 0000000000000000 [ 837.711390][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 837.719373][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 837.727355][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 837.736275][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.742852][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 837.750903][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.758968][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.767043][T10040] Call Trace: [ 837.770340][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 837.778130][T10040] #PF: supervisor read access in kernel mode [ 837.784109][T10040] #PF: error_code(0x0000) - not-present page [ 837.790075][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 837.797820][T10040] Oops: 0000 [#23] PREEMPT SMP KASAN [ 837.803124][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 837.811003][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.821159][T10040] Workqueue: events bpf_prog_free_deferred [ 837.827231][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 837.833378][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 837.853870][T10040] RSP: 0018:ffff888088220d18 EFLAGS: 00010806 [ 837.859932][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 837.867995][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 837.876048][T10040] RBP: ffff888088220d58 R08: ffff88808821a480 R09: 0000000000000000 [ 837.884206][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 837.892440][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 837.900407][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 837.909327][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.915996][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 837.924224][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.932366][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.940329][T10040] Call Trace: [ 837.943813][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 837.951602][T10040] #PF: supervisor read access in kernel mode [ 837.957845][T10040] #PF: error_code(0x0000) - not-present page [ 837.964253][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 837.972161][T10040] Thread overran stack, or stack corrupted [ 837.978047][T10040] Oops: 0000 [#24] PREEMPT SMP KASAN [ 837.983472][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 837.991539][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.001710][T10040] Workqueue: events bpf_prog_free_deferred [ 838.007689][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 838.013922][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 838.034062][T10040] RSP: 0018:ffff888088220838 EFLAGS: 00010806 [ 838.040307][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 838.048443][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 838.056758][T10040] RBP: ffff888088220878 R08: ffff88808821a480 R09: 0000000000000000 [ 838.064984][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 838.073043][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 838.081010][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 838.090051][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 838.096628][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 838.104769][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 838.112909][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 838.120879][T10040] Call Trace: [ 838.124421][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 838.132300][T10040] #PF: supervisor read access in kernel mode [ 838.138261][T10040] #PF: error_code(0x0000) - not-present page [ 838.144333][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 838.152185][T10040] Thread overran stack, or stack corrupted [ 838.158091][T10040] Oops: 0000 [#25] PREEMPT SMP KASAN [ 838.163473][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 838.171267][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.181435][T10040] Workqueue: events bpf_prog_free_deferred [ 838.187252][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 838.193591][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 838.213728][T10040] RSP: 0018:ffff888088220358 EFLAGS: 00010806 [ 838.220025][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 838.228358][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 838.236329][T10040] RBP: ffff888088220398 R08: ffff88808821a480 R09: 0000000000000000 [ 838.244646][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 838.252700][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 838.260968][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 838.270150][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 838.276929][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 838.285101][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 838.293071][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 838.301028][T10040] Call Trace: [ 838.304332][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 838.312211][T10040] #PF: supervisor read access in kernel mode [ 838.318280][T10040] #PF: error_code(0x0000) - not-present page [ 838.324341][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 838.331903][T10040] Thread overran stack, or stack corrupted [ 838.338066][T10040] Oops: 0000 [#26] PREEMPT SMP KASAN [ 838.343435][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 838.351224][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.361532][T10040] Workqueue: events bpf_prog_free_deferred [ 838.367377][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 838.373917][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 838.393860][T10040] RSP: 0018:ffff88808821fe78 EFLAGS: 00010806 [ 838.400269][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 838.408562][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 838.417155][T10040] RBP: ffff88808821feb8 R08: ffff88808821a480 R09: 0000000000000000 [ 838.425318][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 838.433378][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 838.441446][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 838.450368][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 838.456959][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 838.465035][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 838.473391][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 838.481360][T10040] Call Trace: [ 838.484661][T10040] ? __die+0x6c/0xb6 [ 838.488552][T10040] ? no_context+0x3e3/0x990 [ 838.493144][T10040] ? __kasan_check_read+0x11/0x20 [ 838.498171][T10040] ? pgtable_bad+0x90/0x90 [ 838.502698][T10040] ? console_unlock+0x6bb/0xf10 [ 838.507630][T10040] ? __kasan_check_read+0x11/0x20 [ 838.512737][T10040] ? __kasan_check_write+0x14/0x20 [ 838.517848][T10040] ? __bad_area_nosemaphore+0xae/0x420 [ 838.523299][T10040] ? console_unlock+0x6a1/0xf10 [ 838.528149][T10040] ? bad_area_nosemaphore+0x2e/0x40 [ 838.533520][T10040] ? __do_page_fault+0x7fa/0xdd0 [ 838.538634][T10040] ? page_fault+0x16/0x40 [ 838.543247][T10040] ? trace_hardirqs_off_caller+0x65/0x230 [ 838.548963][T10040] ? do_page_fault+0x38/0x590 [ 838.553723][T10040] ? page_fault+0x39/0x40 [ 838.558078][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 838.565878][T10040] #PF: supervisor read access in kernel mode [ 838.572196][T10040] #PF: error_code(0x0000) - not-present page [ 838.578247][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 838.585794][T10040] Thread overran stack, or stack corrupted [ 838.591594][T10040] Oops: 0000 [#27] PREEMPT SMP KASAN [ 838.597011][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 838.604978][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.615234][T10040] Workqueue: events bpf_prog_free_deferred [ 838.621044][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 838.627190][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 838.647251][T10040] RSP: 0018:ffff88808821f998 EFLAGS: 00010806 [ 838.653761][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 838.662200][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 838.670431][T10040] RBP: ffff88808821f9d8 R08: ffff88808821a480 R09: 0000000000000000 [ 838.678430][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 838.686394][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 838.694388][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 838.703502][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 838.710166][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 838.718140][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 838.726305][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 838.734271][T10040] Call Trace: [ 838.737589][T10040] ? __die+0x6c/0xb6 [ 838.741535][T10040] ? no_context+0x3e3/0x990 [ 838.746037][T10040] ? __kasan_check_read+0x11/0x20 [ 838.751058][T10040] ? pgtable_bad+0x90/0x90 [ 838.755471][T10040] ? console_unlock+0x6bb/0xf10 [ 838.761039][T10040] ? __kasan_check_read+0x11/0x20 [ 838.766069][T10040] ? __kasan_check_write+0x14/0x20 [ 838.771393][T10040] ? __bad_area_nosemaphore+0xae/0x420 [ 838.776843][T10040] ? console_unlock+0x6a1/0xf10 [ 838.781702][T10040] ? bad_area_nosemaphore+0x2e/0x40 [ 838.787086][T10040] ? __do_page_fault+0x7fa/0xdd0 [ 838.792041][T10040] ? page_fault+0x16/0x40 [ 838.796452][T10040] ? trace_hardirqs_off_caller+0x65/0x230 [ 838.802170][T10040] ? do_page_fault+0x38/0x590 [ 838.806844][T10040] ? page_fault+0x39/0x40 [ 838.811183][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 838.818975][T10040] #PF: supervisor read access in kernel mode [ 838.824942][T10040] #PF: error_code(0x0000) - not-present page [ 838.830908][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 838.838537][T10040] Thread overran stack, or stack corrupted [ 838.844333][T10040] Oops: 0000 [#28] PREEMPT SMP KASAN [ 838.849931][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 838.857809][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.867962][T10040] Workqueue: events bpf_prog_free_deferred [ 838.873855][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 838.880090][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 838.899780][T10040] RSP: 0018:ffff88808821f4b8 EFLAGS: 00010806 [ 838.906011][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 838.914261][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 838.922339][T10040] RBP: ffff88808821f4f8 R08: ffff88808821a480 R09: 0000000000000000 [ 838.930477][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 838.938442][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 838.946472][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 838.955654][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 838.962228][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 838.970198][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 838.978620][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 838.986582][T10040] Call Trace: [ 838.989903][T10040] ? __die+0x6c/0xb6 [ 838.993887][T10040] ? no_context+0x3e3/0x990 [ 838.998576][T10040] ? __kasan_check_read+0x11/0x20 [ 839.003598][T10040] ? pgtable_bad+0x90/0x90 [ 839.008201][T10040] ? console_unlock+0x6bb/0xf10 [ 839.013226][T10040] ? __kasan_check_read+0x11/0x20 [ 839.018254][T10040] ? __kasan_check_write+0x14/0x20 [ 839.023537][T10040] ? __bad_area_nosemaphore+0xae/0x420 [ 839.029099][T10040] ? console_unlock+0x6a1/0xf10 [ 839.034054][T10040] ? bad_area_nosemaphore+0x2e/0x40 [ 839.039253][T10040] ? __do_page_fault+0x7fa/0xdd0 [ 839.044434][T10040] ? page_fault+0x16/0x40 [ 839.048866][T10040] ? trace_hardirqs_off_caller+0x65/0x230 [ 839.054673][T10040] ? do_page_fault+0x38/0x590 [ 839.059452][T10040] ? page_fault+0x39/0x40 [ 839.063880][T10040] BUG: unable to handle page fault for address: fffffbfff4003000 [ 839.071846][T10040] #PF: supervisor read access in kernel mode [ 839.077963][T10040] #PF: error_code(0x0000) - not-present page [ 839.084122][T10040] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a0d73067 PTE 0 [ 839.091683][T10040] Thread overran stack, or stack corrupted [ 839.097563][T10040] Oops: 0000 [#29] PREEMPT SMP KASAN [ 839.102940][T10040] CPU: 0 PID: 10040 Comm: kworker/0:4 Not tainted 5.3.0-rc5+ #126 [ 839.111230][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.121386][T10040] Workqueue: events bpf_prog_free_deferred [ 839.127368][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 839.133612][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 839.153556][T10040] RSP: 0018:ffff88808821efd8 EFLAGS: 00010806 [ 839.159631][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 839.167790][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 839.175881][T10040] RBP: ffff88808821f018 R08: ffff88808821a480 R09: 0000000000000000 [ 839.183868][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 839.191933][T10040] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff888094117078 [ 839.200024][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 839.209123][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 839.215788][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 839.223756][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 839.231922][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 839.240151][T10040] Call Trace: [ 839.243428][T10040] Modules linked in: [ 839.247373][T10040] CR2: fffffbfff4003000 [ 839.251526][T10040] ---[ end trace 6432b10b429a700d ]--- [ 839.256994][T10040] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 839.263142][T10040] Code: 75 07 e8 f3 c2 f4 ff 0f 0b e8 ec c2 f4 ff 48 89 de 4c 89 f7 e8 01 c4 f4 ff 49 39 de 72 71 e8 d7 c2 f4 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 839.283054][T10040] RSP: 0018:ffff888088227850 EFLAGS: 00010806 [ 839.289120][T10040] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: ffffffff817db06f [ 839.297622][T10040] RDX: 0000000000000000 RSI: ffffffff817db079 RDI: 0000000000000006 [ 839.305703][T10040] RBP: ffff888088227890 R08: ffff88808821a480 R09: 0000000000000000 [ 839.313756][T10040] R10: fffffbfff134af3f R11: ffff88808821a480 R12: ffff888094117078 [ 839.321910][T10040] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff888094117078 [ 839.329997][T10040] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 839.339026][T10040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 839.345796][T10040] CR2: fffffbfff4003000 CR3: 000000005f16f000 CR4: 00000000001406f0 [ 839.353857][T10040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 839.361982][T10040] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 839.369951][T10040] Kernel panic - not syncing: Fatal exception [ 839.378606][T10040] Kernel Offset: disabled [ 839.383115][T10040] Rebooting in 86400 seconds..