0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 2: socket$l2tp6(0xa, 0x2, 0x73) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x4) recvmsg$can_j1939(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="a5ad4804", @ANYRES16=0x0, @ANYBLOB="00022abd7000fddbdf2506000000080019000000000006000e00553500000c0010000180000000000000050004009f00000005000d000100000006001a004e2300000500040005000000"], 0x50}, 0x1, 0x0, 0x0, 0x4048001}, 0xc00) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:01:56 executing program 1: syz_io_uring_setup(0x16bc, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), 0x0) syz_io_uring_setup(0x5861, &(0x7f00000003c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, &(0x7f0000000480)) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x0, 0x70bd27, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}}, 0x800) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@broadcast, @in=@local, 0x4e20, 0xe4f2, 0x4e20, 0x8001, 0x2, 0x0, 0xa0, 0x32, 0x0, 0xee00}, {0x5, 0x84d, 0x64b2f74d, 0x0, 0x4, 0xccc, 0x0, 0x800}, {0x1, 0x1, 0x63aa}, 0x3b0c, 0x6e6bb5, 0x2, 0x0, 0x3, 0x3}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d3, 0x2b}, 0xa, @in=@private=0xa010101, 0x3507, 0x2, 0x1, 0x9, 0x7, 0x7fff, 0x7ff}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@private1={0xfc, 0x1, [], 0x1}, @private1, @empty, 0x8000, 0x1, 0x9, 0x21fc5ba1796dafac, 0x8, 0x400d0104}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x0, 0x0, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}}, 0x800) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:01:56 executing program 1: syz_io_uring_setup(0x16bc, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), 0x0) syz_io_uring_setup(0x5861, &(0x7f00000003c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, &(0x7f0000000480)) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) sendmsg$AUDIT_TRIM(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x1, 0x70bd2a, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x10) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x0, 0x0, 0x0, "", ["", "", "", ""]}, 0x10}}, 0x800) 10:01:56 executing program 1: syz_io_uring_setup(0x16bc, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), 0x0) syz_io_uring_setup(0x5861, &(0x7f00000003c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), 0x0) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00', 0x6, 0x6, 0xb7, 0x500, 0x5, 0x4}) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x0, 0x0, 0x0, "", ["", "", ""]}, 0x10}}, 0x800) 10:01:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) 10:01:56 executing program 1: syz_io_uring_setup(0x16bc, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), 0x0) syz_io_uring_setup(0x5861, &(0x7f00000003c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), 0x0) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x6, 0x6, 0xb7, 0x500, 0x5, 0x4}) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x0, 0x0, 0x0, "", ["", ""]}, 0x10}}, 0x800) 10:01:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x0, 0x0, 0x0, "", [""]}, 0x10}}, 0x800) 10:01:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x10, 0x70bd2a, 0x25dfdbfc, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20040000}, 0x14) 10:01:56 executing program 1: syz_io_uring_setup(0x16bc, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), 0x0) syz_io_uring_setup(0x5861, &(0x7f00000003c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), 0x0) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x6, 0xb7, 0x500, 0x5, 0x4}) 10:01:56 executing program 2: getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x800) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 2: sysfs$2(0x2, 0x8, &(0x7f0000000000)=""/4096) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0xb7, 0x500, 0x5, 0x4}) 10:01:56 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x82c00, 0x0) r1 = socket(0x1, 0x3, 0x6) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000001440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001400)={&(0x7f00000003c0)={0x1010, 0x464, 0x20, 0x70bd25, 0x25dfdbff, "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", ["", "", "", "", "", "", "", ""]}, 0x1010}, 0x1, 0x0, 0x0, 0x800}, 0x800) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xf1, 0x0, 0xed, 0x2, 0x0, 0xfffffffffffffffa, 0x8, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x20}, 0x8012, 0x6, 0x7fafddfd, 0x6, 0x38, 0x2, 0x74}, 0x0, 0x7, r0, 0x1) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40c41, 0x0) 10:01:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 2: ioctl$SNDCTL_TMR_STOP(0xffffffffffffffff, 0x5403) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x82c00, 0x0) r1 = socket(0x1, 0x3, 0x6) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000001440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001400)={&(0x7f00000003c0)={0x1010, 0x464, 0x20, 0x70bd25, 0x25dfdbff, "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", ["", "", "", "", "", "", "", ""]}, 0x1010}, 0x1, 0x0, 0x0, 0x800}, 0x800) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xf1, 0x0, 0xed, 0x2, 0x0, 0xfffffffffffffffa, 0x8, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x20}, 0x8012, 0x6, 0x7fafddfd, 0x6, 0x38, 0x2, 0x74}, 0x0, 0x7, r0, 0x1) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:56 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:56 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r4, 0xc0045406) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) ioctl$SNDCTL_SEQ_PANIC(r5, 0x5111) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001880)='/dev/dlm-monitor\x00', 0x300, 0x0) sendmsg$AUDIT_ADD_RULE(r6, &(0x7f0000001d80)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001900)={0x434, 0x3f3, 0x100, 0x70bd25, 0x25dfdbfc, {0x3, 0x2, 0x34, [0x9, 0x2, 0x80, 0x20, 0x5, 0x6, 0x8, 0x1, 0x4, 0x7fff, 0x1, 0x6, 0x7fff, 0x959d, 0x7f, 0xf189, 0x5, 0x6, 0xd9, 0x80000001, 0x6, 0x20, 0x7fff, 0x81, 0xda92, 0x1, 0x81e5, 0x7fff, 0x9, 0x0, 0x0, 0x2df5, 0x6, 0x100, 0x3d, 0x0, 0x5edf, 0x10000, 0x100, 0x4d, 0x7, 0x5, 0xff, 0xfffffeff, 0x9, 0x5, 0x67, 0x5, 0x2, 0x80000001, 0x1ff, 0xfc7b, 0x0, 0x4, 0x7, 0x59, 0x5, 0x9, 0x3, 0x7ff, 0x7fff, 0xffffffff, 0x2, 0x8], [0x80000000, 0x0, 0xaf6, 0xfffff994, 0x4, 0x9, 0x5, 0x1, 0x0, 0x7f, 0x5, 0x3, 0x3, 0x80000000, 0x7, 0x20, 0x7fffffff, 0x7, 0x6, 0x3, 0x1, 0xfb6, 0x9, 0x1000, 0x100, 0x1, 0x9f3, 0x0, 0x80, 0x3, 0x10000, 0xffff, 0x8000, 0x100, 0xcd18, 0xb, 0x100, 0x0, 0x9, 0x7f, 0xcc, 0x400, 0xfc000000, 0x2, 0xffffffff, 0x3f, 0x2e2a, 0x2000, 0x2b, 0x71, 0x2093, 0x7fff, 0x401, 0x6, 0x2, 0x2, 0x3f, 0xff, 0x800, 0x8d0, 0x8, 0x6, 0xffffffff, 0x1], [0x5, 0x2, 0x1, 0x480, 0x9, 0xc08b, 0xfffffffe, 0x1, 0x9, 0x5, 0x8, 0x0, 0x5, 0x9, 0x3f, 0x0, 0x7, 0x5, 0x7, 0x1, 0x9, 0x1a, 0x3, 0x9, 0x6, 0x8000, 0x3, 0x0, 0xc5, 0x5, 0x63, 0xff, 0xfffffffa, 0x2, 0x3b89, 0x54227ce4, 0x4, 0x4, 0x7, 0x3000000, 0x79, 0x2, 0x3, 0x4, 0x200, 0x7, 0x8, 0xc9, 0x2, 0x20, 0x8001, 0x3, 0x6, 0x8000, 0x80000000, 0x3, 0x3, 0x3, 0x0, 0x62e, 0x8, 0x1000, 0x82, 0x80000000], [0x200, 0x7ff, 0xfff, 0x8001, 0x4a, 0xaa7, 0x2, 0x7, 0x3, 0x6, 0x1, 0xff, 0x4, 0xf0, 0xfffffffe, 0xffffffff, 0xffffffff, 0x1, 0x9, 0x7f, 0x400, 0x0, 0x7f, 0x2, 0xffff, 0x7d, 0x834b, 0x4, 0x1ff, 0x400, 0xf0000000, 0x8001, 0x7, 0x1000, 0x3, 0x9, 0x359, 0x3, 0x40, 0xffffffff, 0x8, 0x1c6b, 0x1000, 0x401, 0x4, 0x0, 0x0, 0x5b46, 0x108001, 0x8b7, 0x8001, 0xb43, 0x280a, 0xc204, 0x3, 0xc7, 0x2, 0x25d, 0x4, 0x0, 0x6, 0x6295, 0x1, 0x1], 0x11, ['/dev/vcs\x00', '-\x00', ',\\\x00', '!\x00', '\x00']}, ["", "", "", "", "", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 10:01:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:56 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x82c00, 0x0) r1 = socket(0x1, 0x3, 0x6) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000001440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001400)={&(0x7f00000003c0)={0x1010, 0x464, 0x20, 0x70bd25, 0x25dfdbff, "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", ["", "", "", "", "", "", "", ""]}, 0x1010}, 0x1, 0x0, 0x0, 0x800}, 0x800) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xf1, 0x0, 0xed, 0x2, 0x0, 0xfffffffffffffffa, 0x8, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x20}, 0x8012, 0x6, 0x7fafddfd, 0x6, 0x38, 0x2, 0x74}, 0x0, 0x7, r0, 0x1) 10:01:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:56 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200100, 0x0) syz_io_uring_setup(0x5238, &(0x7f0000000180)={0x0, 0x4d82, 0x1, 0x3, 0x154}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) r2 = syz_io_uring_complete(r1) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="8bce29bd7000fedbdf250700000014001f00fc0100000000000000000000000000010800180000010500210001000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000004}, 0x4044081) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000280), &(0x7f0000000340)=0x4) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r4, 0xc0045406) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) ioctl$SNDCTL_SEQ_PANIC(r5, 0x5111) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001880)='/dev/dlm-monitor\x00', 0x300, 0x0) sendmsg$AUDIT_ADD_RULE(r6, &(0x7f0000001d80)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001900)={0x434, 0x3f3, 0x100, 0x70bd25, 0x25dfdbfc, {0x3, 0x2, 0x34, [0x9, 0x2, 0x80, 0x20, 0x5, 0x6, 0x8, 0x1, 0x4, 0x7fff, 0x1, 0x6, 0x7fff, 0x959d, 0x7f, 0xf189, 0x5, 0x6, 0xd9, 0x80000001, 0x6, 0x20, 0x7fff, 0x81, 0xda92, 0x1, 0x81e5, 0x7fff, 0x9, 0x0, 0x0, 0x2df5, 0x6, 0x100, 0x3d, 0x0, 0x5edf, 0x10000, 0x100, 0x4d, 0x7, 0x5, 0xff, 0xfffffeff, 0x9, 0x5, 0x67, 0x5, 0x2, 0x80000001, 0x1ff, 0xfc7b, 0x0, 0x4, 0x7, 0x59, 0x5, 0x9, 0x3, 0x7ff, 0x7fff, 0xffffffff, 0x2, 0x8], [0x80000000, 0x0, 0xaf6, 0xfffff994, 0x4, 0x9, 0x5, 0x1, 0x0, 0x7f, 0x5, 0x3, 0x3, 0x80000000, 0x7, 0x20, 0x7fffffff, 0x7, 0x6, 0x3, 0x1, 0xfb6, 0x9, 0x1000, 0x100, 0x1, 0x9f3, 0x0, 0x80, 0x3, 0x10000, 0xffff, 0x8000, 0x100, 0xcd18, 0xb, 0x100, 0x0, 0x9, 0x7f, 0xcc, 0x400, 0xfc000000, 0x2, 0xffffffff, 0x3f, 0x2e2a, 0x2000, 0x2b, 0x71, 0x2093, 0x7fff, 0x401, 0x6, 0x2, 0x2, 0x3f, 0xff, 0x800, 0x8d0, 0x8, 0x6, 0xffffffff, 0x1], [0x5, 0x2, 0x1, 0x480, 0x9, 0xc08b, 0xfffffffe, 0x1, 0x9, 0x5, 0x8, 0x0, 0x5, 0x9, 0x3f, 0x0, 0x7, 0x5, 0x7, 0x1, 0x9, 0x1a, 0x3, 0x9, 0x6, 0x8000, 0x3, 0x0, 0xc5, 0x5, 0x63, 0xff, 0xfffffffa, 0x2, 0x3b89, 0x54227ce4, 0x4, 0x4, 0x7, 0x3000000, 0x79, 0x2, 0x3, 0x4, 0x200, 0x7, 0x8, 0xc9, 0x2, 0x20, 0x8001, 0x3, 0x6, 0x8000, 0x80000000, 0x3, 0x3, 0x3, 0x0, 0x62e, 0x8, 0x1000, 0x82, 0x80000000], [0x200, 0x7ff, 0xfff, 0x8001, 0x4a, 0xaa7, 0x2, 0x7, 0x3, 0x6, 0x1, 0xff, 0x4, 0xf0, 0xfffffffe, 0xffffffff, 0xffffffff, 0x1, 0x9, 0x7f, 0x400, 0x0, 0x7f, 0x2, 0xffff, 0x7d, 0x834b, 0x4, 0x1ff, 0x400, 0xf0000000, 0x8001, 0x7, 0x1000, 0x3, 0x9, 0x359, 0x3, 0x40, 0xffffffff, 0x8, 0x1c6b, 0x1000, 0x401, 0x4, 0x0, 0x0, 0x5b46, 0x108001, 0x8b7, 0x8001, 0xb43, 0x280a, 0xc204, 0x3, 0xc7, 0x2, 0x25d, 0x4, 0x0, 0x6, 0x6295, 0x1, 0x1], 0x11, ['/dev/vcs\x00', '-\x00', ',\\\x00', '!\x00', '\x00']}, ["", "", "", "", "", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="100026bd7000fedbdf25030000000800090003000008000018000a01010214002000fe80000000000000000000000000001e0600020000000000"], 0x40}}, 0x800) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000340)=0x80) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00', r2) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x82c00, 0x0) r0 = socket(0x1, 0x3, 0x6) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000001440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001400)={&(0x7f00000003c0)={0x1010, 0x464, 0x20, 0x70bd25, 0x25dfdbff, "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", ["", "", "", "", "", "", "", ""]}, 0x1010}, 0x1, 0x0, 0x0, 0x800}, 0x800) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r4, 0xc0045406) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) ioctl$SNDCTL_SEQ_PANIC(r5, 0x5111) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001880)='/dev/dlm-monitor\x00', 0x300, 0x0) sendmsg$AUDIT_ADD_RULE(r6, &(0x7f0000001d80)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001900)={0x434, 0x3f3, 0x100, 0x70bd25, 0x25dfdbfc, {0x3, 0x2, 0x34, [0x9, 0x2, 0x80, 0x20, 0x5, 0x6, 0x8, 0x1, 0x4, 0x7fff, 0x1, 0x6, 0x7fff, 0x959d, 0x7f, 0xf189, 0x5, 0x6, 0xd9, 0x80000001, 0x6, 0x20, 0x7fff, 0x81, 0xda92, 0x1, 0x81e5, 0x7fff, 0x9, 0x0, 0x0, 0x2df5, 0x6, 0x100, 0x3d, 0x0, 0x5edf, 0x10000, 0x100, 0x4d, 0x7, 0x5, 0xff, 0xfffffeff, 0x9, 0x5, 0x67, 0x5, 0x2, 0x80000001, 0x1ff, 0xfc7b, 0x0, 0x4, 0x7, 0x59, 0x5, 0x9, 0x3, 0x7ff, 0x7fff, 0xffffffff, 0x2, 0x8], [0x80000000, 0x0, 0xaf6, 0xfffff994, 0x4, 0x9, 0x5, 0x1, 0x0, 0x7f, 0x5, 0x3, 0x3, 0x80000000, 0x7, 0x20, 0x7fffffff, 0x7, 0x6, 0x3, 0x1, 0xfb6, 0x9, 0x1000, 0x100, 0x1, 0x9f3, 0x0, 0x80, 0x3, 0x10000, 0xffff, 0x8000, 0x100, 0xcd18, 0xb, 0x100, 0x0, 0x9, 0x7f, 0xcc, 0x400, 0xfc000000, 0x2, 0xffffffff, 0x3f, 0x2e2a, 0x2000, 0x2b, 0x71, 0x2093, 0x7fff, 0x401, 0x6, 0x2, 0x2, 0x3f, 0xff, 0x800, 0x8d0, 0x8, 0x6, 0xffffffff, 0x1], [0x5, 0x2, 0x1, 0x480, 0x9, 0xc08b, 0xfffffffe, 0x1, 0x9, 0x5, 0x8, 0x0, 0x5, 0x9, 0x3f, 0x0, 0x7, 0x5, 0x7, 0x1, 0x9, 0x1a, 0x3, 0x9, 0x6, 0x8000, 0x3, 0x0, 0xc5, 0x5, 0x63, 0xff, 0xfffffffa, 0x2, 0x3b89, 0x54227ce4, 0x4, 0x4, 0x7, 0x3000000, 0x79, 0x2, 0x3, 0x4, 0x200, 0x7, 0x8, 0xc9, 0x2, 0x20, 0x8001, 0x3, 0x6, 0x8000, 0x80000000, 0x3, 0x3, 0x3, 0x0, 0x62e, 0x8, 0x1000, 0x82, 0x80000000], [0x200, 0x7ff, 0xfff, 0x8001, 0x4a, 0xaa7, 0x2, 0x7, 0x3, 0x6, 0x1, 0xff, 0x4, 0xf0, 0xfffffffe, 0xffffffff, 0xffffffff, 0x1, 0x9, 0x7f, 0x400, 0x0, 0x7f, 0x2, 0xffff, 0x7d, 0x834b, 0x4, 0x1ff, 0x400, 0xf0000000, 0x8001, 0x7, 0x1000, 0x3, 0x9, 0x359, 0x3, 0x40, 0xffffffff, 0x8, 0x1c6b, 0x1000, 0x401, 0x4, 0x0, 0x0, 0x5b46, 0x108001, 0x8b7, 0x8001, 0xb43, 0x280a, 0xc204, 0x3, 0xc7, 0x2, 0x25d, 0x4, 0x0, 0x6, 0x6295, 0x1, 0x1], 0x11, ['/dev/vcs\x00', '-\x00', ',\\\x00', '!\x00', '\x00']}, ["", "", "", "", "", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0xb7, 0x0, 0x5, 0x4}) 10:01:57 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x82c00, 0x0) socket(0x1, 0x3, 0x6) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x51}, 0x20000000) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r4, 0xc0045406) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) ioctl$SNDCTL_SEQ_PANIC(r5, 0x5111) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001880)='/dev/dlm-monitor\x00', 0x300, 0x0) 10:01:57 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x1, 0x3, 0x6) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0xb7, 0x0, 0x0, 0x4}) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f5, 0x800, 0x70bd2d, 0x25dfdbfe, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r4, 0xc0045406) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) ioctl$SNDCTL_SEQ_PANIC(r5, 0x5111) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 1: socket(0x1, 0x3, 0x6) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0xb7}) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getpeername(r0, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0xfc34) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r3, 0xc0045406) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) ioctl$SNDCTL_SEQ_PANIC(r4, 0x5111) 10:01:57 executing program 1: socket(0x0, 0x3, 0x6) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 2: getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) recvfrom$l2tp(r1, &(0x7f0000000100)=""/39, 0x27, 0x2020, 0x0, 0x0) recvmsg$can_j1939(r0, 0x0, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x3, 0xffffffffffffffff, 0x0) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r3, 0xc0045406) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x280, 0x0) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 1: socket(0x0, 0x3, 0x6) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$I2C_SLAVE_FORCE(r0, 0x706, 0xcf) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 1: socket(0x0, 0x3, 0x6) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_SOURCE(r3, 0xc0045406) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000000)) socket$phonet_pipe(0x23, 0x5, 0x2) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) pipe(&(0x7f00000001c0)) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 1: socket(0x1, 0x0, 0x6) 10:01:57 executing program 0: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 0: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) 10:01:57 executing program 1: socket(0x1, 0x0, 0x0) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2f, 0x1f, 0x53, 0x20, 0x0, 0x9, 0x8102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x4800, 0x7, 0x9, 0x3, 0x9, 0x4, 0x3ff}, 0xffffffffffffffff, 0x2, r0, 0x3) 10:01:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) pidfd_getfd(r1, r3, 0x0) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 1: socket(0x1, 0x0, 0x0) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 10:01:57 executing program 0: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 1: socket(0x1, 0x0, 0x0) 10:01:57 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001700)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/57, 0x39}, {&(0x7f0000001580)=""/121, 0x79}, {&(0x7f0000001600)=""/97, 0x61}], 0x8}, 0x10200) 10:01:57 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:57 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pidfd_send_signal(r0, 0x2d, &(0x7f0000000100)={0xc, 0x0, 0x6}, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x400, 0x70bd2c, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) pidfd_getfd(r1, r3, 0x0) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20800, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x4ba, 0x0, 0x12, 0x10, 0x4, "f7903d4ed6b3360cbb471e5264a25cbbbef0a362ab261e012a6dc17abd77ac4f5cfd5d662fcfc170984cb08e8403a3baa496a6f2fd7d32b7f61f85ee66cfcd65", "affc7d126dd706826a4ff45e1440f6e4763ed3c1e7495095fb4a395278af652512c4e39addd73fb0599a88cb67f31d770206c8f6b47fdf6bfe02d97ccf1bc23f", "491929d7ee9a40a81e3b03016e721847c3e3c822e8b7e74f2e1be7c19c716b0b", [0xfffffffffffff562, 0x40]}) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) pidfd_getfd(r1, r3, 0x0) 10:01:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x92, 0x5, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) pipe(&(0x7f0000004c80)) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) pidfd_getfd(r1, r3, 0x0) 10:01:58 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x109000, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x400) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x418500, 0x0) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) 10:01:58 executing program 0: socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:01:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) 10:01:58 executing program 0: socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 0: socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x500, 0x5, 0x4}) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xff, 0x6, 0xb1, 0x7, 0x0, 0x8, 0x8001, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x1, 0x8001}, 0x20, 0x136b2029, 0x67, 0xf, 0x2, 0x71, 0x7f}, 0xffffffffffffffff, 0xe, r0, 0x3) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x5, 0xe9, 0x2, 0x47, 0x0, 0xcd, 0x8473eb6b731d20d5, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x8000, 0x1000, 0x2, 0x9, 0x80, 0x6, 0x9}, 0xffffffffffffffff, 0xf, r1, 0x1) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:01:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x5, 0x4}) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(0xffffffffffffffff, 0x80045104, &(0x7f00000000c0)) ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000000)={"0419ce4995af51251dceaeb5ed532ba0e387b09947d8a8ded1eb83ae4245", 0x7, 0x65fcbb2c6c745490, 0x1, 0x6, 0x5, 0x100, 0x4, 0x0, [0x7ff, 0x7, 0x7, 0x8, 0xfffffff7, 0x2, 0x27558, 0x4, 0x1, 0x1, 0x1, 0x9, 0x1, 0x2, 0x9, 0x10000, 0x7fff, 0x3, 0x3]}) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x40, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 10:01:58 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:58 executing program 2: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045113, &(0x7f0000000040)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f0000000000)) 10:01:58 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00'}) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00'}) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002cc0)={'syztnl1\x00', &(0x7f0000002c40)={'erspan0\x00', 0x0, 0x7800, 0x7, 0xffff, 0x851c, {{0xc, 0x4, 0x3, 0x3, 0x30, 0x68, 0x0, 0x5, 0x4, 0x0, @rand_addr=0x64010102, @remote, {[@rr={0x7, 0x3, 0x42}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x13, 0x70, [@multicast1, @private=0xa010100, @empty, @multicast1]}]}}}}}) bind$can_raw(r0, &(0x7f0000002d00)={0x1d, r1}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000007c0)={@remote, r3}, 0x14) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r4, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000080)={'mangle\x00', 0xcd, "a0edb71f76e604702923eb4ad550f243e8e3dd254f228d01853a4178a01aed1334fbcce86fbdf6f189d7dfcc94be7afdcb81509f87ccdc97ee8c3d729ee6f0095ae1865fb48452103436e959693ffe3a4d5483eda8793bbda168a34b9d3764c47720882a8b345f243e9c8b1c070677fb235e19fd2fd10fb7f240af32bc1ef6bcf631d0f47ff75431bdf5f0ecd5faba73ba45d1043fba5a975d180ae6e3f06df78b1493eb714cf9517328a4cbdbd5202791ed685e56bba8c0189b57bdb3ee874b22016e139892e4e981093c18f2"}, &(0x7f0000000180)=0xf1) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @empty, 'ip6erspan0\x00'}}) 10:01:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00'}) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4001, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f000000b2c0)={@private2, @private1, @rand_addr=' \x01\x00'}) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 10:01:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xba9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 2: keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1c148c0c}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000)=0x1, 0x4) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x484}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x600080, 0x0) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x3fa, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20040010}, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x34000, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x40) ioctl$SNDCTL_FM_LOAD_INSTR(r2, 0x40285107) recvmsg$can_j1939(r0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rxrpc_notify_socket\x00', r0}, 0x10) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x8, 0x400100) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x8c380, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4d94, 0x10042) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r2, 0x0) 10:01:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)) 10:01:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$I2C_TENBIT(r0, 0x704, 0x0) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 2: ioctl$sock_ifreq(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'macsec0\x00', @ifru_ivalue}) socket$inet(0x2, 0x0, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r2, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r2, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:01:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) 10:01:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:01:59 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 10:01:59 executing program 2: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x453, 0x8, 0x70bd2c, 0x25dfdbff, "8596facff76fdb52e9057337c5df525b34d76f055a8c0413c759", ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400c0}, 0x20000804) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x88}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_MTU={0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x8c0}, 0x20004040) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x6, 0x18, 0x0, 0x2d, 0x0, 0xfffffffffffffff9, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x410, 0x80000000, 0x100, 0x8, 0xffff, 0xc0000000}, 0xffffffffffffffff, 0x6, r0, 0x0) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd20a4e8bfece4175}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1b}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x10000}, 0x40040) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) 10:02:00 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$I2C_TENBIT(r1, 0x704, 0x1) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f0000000000)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x84000) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000140)=[{}, {}], &(0x7f0000000180)=0x10) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 2: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x0, 0xfffffff7, {{0x6, 0x4, 0x3, 0x4, 0x18, 0x65, 0x0, 0x3, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}, @private=0xca5, {[@noop]}}}}}) ioctl$SNDCTL_FM_LOAD_INSTR(r0, 0x40285107) ioctl$SNDCTL_TMR_SOURCE(r0, 0xc0045406) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000180)={0x9, 0xb5, 0x4bc6de89, 0x80000, r0}) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private2, 0x4e24, 0x8, 0x4e20, 0xbbcb, 0xa, 0x0, 0xa0, 0x11, r1, 0xffffffffffffffff}, {0x9, 0x80000000, 0xffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x4, 0x8, 0x101}, {0xba, 0x7, 0x1000, 0x6}, 0x3, 0x6e6bbd, 0x2, 0x1, 0x2, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0xff}, 0xa, @in=@broadcast, 0x3503, 0x4, 0x3, 0x40, 0x7ff, 0xdb2, 0x2}}, 0xe8) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000000)={"0308e9024499f80ca8b8bfd1dc4e215cd53920f46b56983ac1ecbb6c7d78", 0xfffffff7, 0x0, 0x0, 0x3, 0x2, 0x4, 0x7ff, 0x3, [0xfffffff9, 0x50, 0x0, 0x0, 0xaff, 0x2, 0x9, 0x7fff, 0x81, 0x6b79, 0x5, 0x7, 0x5, 0x401, 0xffffffff, 0x6, 0x6, 0xf055, 0x9]}) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:00 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = socket(0xa, 0x3, 0xfffffffc) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00', r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0xfffffffffffffffc}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(0xffffffffffffffff, 0xc0045103, &(0x7f0000000040)=0x9) 10:02:00 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @hci={0x1f, 0x1, 0x1}, @hci={0x1f, 0x3}, @l2={0x1f, 0x2ffb, @any, 0x0, 0x2}, 0x6, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='veth0_virt_wifi\x00', 0xfffffffffffffff7, 0x100000001, 0x2}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:00 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = socket(0xa, 0x3, 0xfffffffc) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00', r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = socket(0xa, 0x3, 0xfffffffc) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00', r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = socket(0xa, 0x3, 0xfffffffc) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00', r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) socket(0xa, 0x3, 0xfffffffc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x200003c5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:01 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:01 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x2e0000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 2: pipe(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:02 executing program 2: pipe(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x9, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0xa, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 2: pipe(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r0, r1, 0x0) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 5: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfca4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xf6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010040}, 0x4004040) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x4000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = socket(0xa, 0x3, 0xfffffffc) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00', r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0xb, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0xd, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0xe, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x11, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f5, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:02 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:02:02 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:02 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x12, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x60, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x1001, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb70}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x7c00, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:02:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x200000c8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000140)=@framed={{}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}, @map={0x18, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x6, &(0x7f0000000140)=@framed={{}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit, @generic={0x2, 0xe, 0x6, 0x6, 0x7f}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000140)=@framed={{}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}, @exit]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x10, 0x0}, 0x78) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@alu={0x4, 0x0, 0x8, 0x9, 0x4, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3, 0x10, 0x0}, 0x78) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x4, 0x10, 0x0}, 0x78) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x5, 0x10, 0x0}, 0x78) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, 0x0, 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6, 0x10, 0x0}, 0x78) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r2, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, 0x0, 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7, 0x10, 0x0}, 0x78) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, 0x0, 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x10, 0x0}, 0x78) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 10:02:03 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:03 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 10:02:03 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r2, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pidfd_getfd(r1, r3, 0x0) 10:02:03 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x10, 0x0}, 0x78) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4706, &(0x7f0000000340)={0x0, 0x6544, 0x0, 0x0, 0x2ae}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000100)=0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2e0000, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @mcast2, 0x7fff, 0x2}}, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x11, 0x3ff, 0x4, 0x2, 0x20, r1, 0x7ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xa, 0x10, 0x0}, 0x78) 10:02:04 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xa0, &(0x7f00000001c0)=""/160, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xb, 0x10, 0x0}, 0x78) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xc, 0x10, 0x0}, 0x78) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xd, 0x10, 0x0}, 0x78) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x78) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x5}, 0x8) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x10, 0x10, 0x0}, 0x78) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x92, 0x5, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x11, 0x10, 0x0}, 0x78) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x92, 0x5, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$describe(0x6, r1, &(0x7f0000000000)=""/212, 0xd4) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x12, 0x10, 0x0}, 0x78) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x25, 0x10, 0x0}, 0x78) 10:02:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x92, 0x5, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) 10:02:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:04 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x48, 0x10, 0x0}, 0x78) 10:02:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) 10:02:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x92, 0x5, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x4c, 0x10, 0x0}, 0x78) 10:02:05 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 5: perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x58, 0x10, 0x0}, 0x78) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 5: perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x68, 0x10, 0x0}, 0x78) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 5: perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x3, 0xfffffffa}, 0x10}, 0x78) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6c, 0x10, 0x0}, 0x78) 10:02:05 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0xfffffffa}, 0x10}, 0x78) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x74, 0x10, 0x0}, 0x78) 10:02:05 executing program 0: add_key$keyring(0x0, &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x78) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0xce, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7a, 0x10, 0x0}, 0x78) 10:02:05 executing program 0: add_key$keyring(0x0, &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x93, 0x10, 0x0}, 0x78) 10:02:05 executing program 0: add_key$keyring(0x0, &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x160, 0x10, 0x0}, 0x78) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x176, 0x10, 0x0}, 0x78) 10:02:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x300, 0x10, 0x0}, 0x78) 10:02:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:05 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 10:02:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x398, 0x10, 0x0}, 0x78) 10:02:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:05 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x500, 0x10, 0x0}, 0x78) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 10:02:06 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x600, 0x10, 0x0}, 0x78) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r0) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 0: add_key$keyring(&(0x7f00000005c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x700, 0x10, 0x0}, 0x78) 10:02:06 executing program 0: socket(0x1, 0x0, 0x0) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r0) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x900, 0x10, 0x0}, 0x78) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r0) 10:02:06 executing program 0: socket(0x1, 0x0, 0x0) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 0: socket(0x1, 0x0, 0x0) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xa00, 0x10, 0x0}, 0x78) 10:02:06 executing program 1: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 0: socket(0x0, 0x0, 0x0) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xb00, 0x10, 0x0}, 0x78) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 1: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, 0x0, 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 0: socket(0x0, 0x0, 0x0) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xc00, 0x10, 0x0}, 0x78) 10:02:06 executing program 1: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, 0x0, 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, 0x0, 0x6, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 0: socket(0x0, 0x0, 0x0) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xd00, 0x10, 0x0}, 0x78) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000000)) socket$phonet_pipe(0x23, 0x5, 0x2) 10:02:06 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x10, 0x70bd27, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}}, 0x800) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000000)) socket$phonet_pipe(0x23, 0x5, 0x2) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xe00, 0x10, 0x0}, 0x78) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x10, 0x70bd27, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}}, 0x800) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000000)) socket$phonet_pipe(0x23, 0x5, 0x2) 10:02:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x1100, 0x10, 0x0}, 0x78) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xa0, &(0x7f00000001c0)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:06 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x10, 0x70bd27, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}}, 0x800) 10:02:06 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x1200, 0x10, 0x0}, 0x78) 10:02:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:07 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000000)) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x2000, 0x10, 0x0}, 0x78) 10:02:07 executing program 1: getrusage(0x1, &(0x7f0000000000)) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 1: getrusage(0x0, &(0x7f0000000000)) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x2500, 0x10, 0x0}, 0x78) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:07 executing program 1: getrusage(0x0, &(0x7f0000000000)) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x4800, 0x10, 0x0}, 0x78) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:07 executing program 1: getrusage(0x0, &(0x7f0000000000)) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x4c00, 0x10, 0x0}, 0x78) 10:02:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xbff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x5800, 0x10, 0x0}, 0x78) 10:02:07 executing program 1: getrusage(0x1, 0x0) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6001, 0x10, 0x0}, 0x78) 10:02:07 executing program 1: getrusage(0x1, 0x0) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 2: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045104, 0x0) 10:02:07 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x873, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 2: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045104, 0x0) 10:02:07 executing program 1: getrusage(0x1, 0x0) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6800, 0x10, 0x0}, 0x78) 10:02:07 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 2: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045104, 0x0) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6c00, 0x10, 0x0}, 0x78) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:07 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7400, 0x10, 0x0}, 0x78) 10:02:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, 0x0, 0x8) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7601, 0x10, 0x0}, 0x78) 10:02:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, 0x0, 0x8) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:07 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:07 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7a00, 0x10, 0x0}, 0x78) 10:02:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffff6a4e, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, 0x0, 0x8) 10:02:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x9300, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffbff, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x120, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x9803, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xff00, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045104, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc09, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x200000, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045104, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045104, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xa, 0xffffffffffffffff, 0x3) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x1000000, 0x10, 0x0}, 0x78) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045104, 0x0) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x2000000, 0x10, 0x0}, 0x78) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x94f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3000000, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x70bd28, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x4, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x25dfdbfd, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x4000000, 0x10, 0x0}, 0x78) 10:02:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x5, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc0f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x5000000, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x1, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6000000, 0x10, 0x0}, 0x78) 10:02:08 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2e, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff, 0x1], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x9000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7, 0x7ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b, 0x7], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xa000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9, 0x5f8b], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xb000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4, 0x9], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff, 0x4], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xc000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x2, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000, 0xffffffff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xd000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x3, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xe000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3, 0x8000], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1c, 0x0, 0x0) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800, 0x3], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x10000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1c, 0x0, 0x0) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000, 0x800], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x11000000, 0x10, 0x0}, 0x78) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1c, 0x0, 0x0) 10:02:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5, 0x10000], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x12000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff, 0x9], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x20000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff, 0x1ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x25000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff, 0x7fff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x48000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6, 0x3ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5, 0x6], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x58000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x60010000, 0x10, 0x0}, 0x78) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1, 0x7fff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x68000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4, 0x1], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5, 0xf4], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x6c000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x74000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x76010000, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3, 0x0, 0x1], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:10 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x7a000000, 0x10, 0x0}, 0x78) 10:02:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff, 0x3], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:10 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:10 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:10 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x93000000, 0x10, 0x0}, 0x78) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6, 0xffff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7, 0x6], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x98030000, 0x10, 0x0}, 0x78) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8, 0x7], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xff000000, 0x10, 0x0}, 0x78) 10:02:11 executing program 5: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x4004510d, 0x0) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2, 0x8], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, 0x0}, 0x78) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:11 executing program 5: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x4004510d, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6, 0x2], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x3, 0x0}, 0x78) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:11 executing program 5: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x4004510d, 0x0) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9, 0x6], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x4, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400, 0x0, 0x9], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x5, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7, 0x400], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x6, 0x0}, 0x78) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6, 0x7], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x7, 0x0}, 0x78) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4, 0x6], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x8, 0x0}, 0x78) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001, 0x4], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0}, 0x78) 10:02:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x4004510d, 0x0) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5, 0x10001], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:11 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x4004510d, 0x0) 10:02:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, 0x0}, 0x78) 10:02:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5, 0x8], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xb, 0x0}, 0x78) 10:02:12 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x4004510d, 0x0) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xc, 0x0}, 0x78) 10:02:12 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x4004510d, 0x0) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xd, 0x0}, 0x78) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1, 0x3ff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x78) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, 0x0}, 0x78) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7, 0x1], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3, 0x7], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x12, 0x0}, 0x78) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x29, 0x0}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000, 0x3], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x30, 0x0}, 0x78) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff, 0x0, 0x8000], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x1001, 0x0}, 0x78) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff, 0xff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa, 0xff], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8, 0xfffffffa], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5, 0x8], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:12 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4}, 0x78) 10:02:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6}, 0x78) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80, 0xde26], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7}, 0x78) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8, 0x80], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0x78) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1, 0xc8], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x9}, 0x78) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f, 0x1], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa}, 0x78) 10:02:13 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x714d, &(0x7f0000000180)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000200)) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1, 0x7f], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738, 0x1], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc}, 0x78) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5, 0x5738], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd}, 0x78) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73, 0x5], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xe}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4, 0xe73], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x0, 0xfffffdf4], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x11}, 0x78) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:13 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:13 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12}, 0x78) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2, 0x20], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x25}, 0x78) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800, 0x2], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x48}, 0x78) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1, 0x800], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4c}, 0x78) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1, 0x1], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x58}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4, 0x1], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f, 0x4], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x68}, 0x78) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4, 0x3f], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6c}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7, 0x4], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x74}, 0x78) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, 0x0, 0x0) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e, 0x4b7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7a}, 0x78) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, 0x0, 0x0) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f, 0xd6e], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x93}, 0x78) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6, 0x3f], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, 0x0, 0x0) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:14 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f, 0x6], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:14 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x160}, 0x78) 10:02:14 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:14 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7, 0x0, 0x1f], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x176}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1, 0x7], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20, 0x1], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x300}, 0x78) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4, 0x20], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x398}, 0x78) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1, 0x0, 0x4], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x500}, 0x78) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1, 0x1], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b, 0x1], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x600}, 0x78) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x700}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff, 0x3b], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101, 0xffffffff], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x900}, 0x78) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6, 0x101], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa00}, 0x78) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5, 0x6], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb00}, 0x78) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100, 0x5], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc00}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000, 0x100], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd00}, 0x78) 10:02:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986, 0x1000], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xe00}, 0x78) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000, 0x56140986], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1100}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81, 0x80000000], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1200}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9, 0x81], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2000}, 0x78) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff, 0x9], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2500}, 0x78) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000, 0x0, 0x7fffffff], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4800}, 0x78) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3, 0x80000000], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4c00}, 0x78) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5800}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000, 0x3], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae, 0x10000], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6001}, 0x78) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6800}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000, 0x26ae], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6c00}, 0x78) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc, 0x80000000], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:16 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7400}, 0x78) 10:02:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1, 0xfc], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7601}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212, 0x1], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7a00}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000, 0x212], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x9300}, 0x78) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff, 0x1000], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x9803}, 0x78) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9, 0xfff], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xff00}, 0x78) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe, 0x0, 0x9], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x200000}, 0x78) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9, 0xfffffffe], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1000000}, 0x78) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9, 0x9], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2000000}, 0x78) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3000000}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6, 0x9], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, 0x0, 0x0) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001, 0x6], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4000000}, 0x78) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401, 0x10001], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, 0x0, 0x0) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5000000}, 0x78) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, 0x0, 0x0) 10:02:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6000000}, 0x78) 10:02:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401, 0x401], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7000000}, 0x78) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3, 0x401], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8000000}, 0x78) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8, 0x3], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x9000000}, 0x78) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3, 0x8], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa000000}, 0x78) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6, 0x3], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb000000}, 0x78) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc000000}, 0x78) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200, 0x0, 0x0, 0x6], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd000000}, 0x78) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3, 0x200], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2, 0x3], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xe000000}, 0x78) 10:02:18 executing program 1: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x714d, &(0x7f0000000180)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000200)) 10:02:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:18 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x2], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10000000}, 0x78) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x11000000}, 0x78) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2, 0xfffffffa], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:18 executing program 2 (fault-call:0 fault-nth:0): bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd09, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:18 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff, 0x2defe3a2], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) [ 2120.747451][T13060] FAULT_INJECTION: forcing a failure. [ 2120.747451][T13060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2120.762803][T13060] CPU: 0 PID: 13060 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 [ 2120.771587][T13060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2120.781637][T13060] Call Trace: [ 2120.784911][T13060] dump_stack+0x137/0x19d [ 2120.789296][T13060] should_fail+0x23c/0x250 [ 2120.792060][T13062] FAULT_INJECTION: forcing a failure. [ 2120.792060][T13062] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2120.793728][T13060] should_fail_usercopy+0x16/0x20 [ 2120.811761][T13060] _copy_from_user+0x1c/0xd0 [ 2120.816382][T13060] __do_sys_bpf+0x143/0x9990 [ 2120.821028][T13060] ? kstrtoull+0x30e/0x350 [ 2120.825449][T13060] ? kstrtouint_from_user+0x104/0x130 [ 2120.830823][T13060] ? __rcu_read_unlock+0x5c/0x250 [ 2120.835851][T13060] ? fsnotify_perm+0x59/0x2e0 [ 2120.840557][T13060] ? __fsnotify_parent+0x32f/0x430 [ 2120.845709][T13060] ? vfs_write+0x572/0x7e0 [ 2120.850151][T13060] ? __fget_light+0x219/0x260 [ 2120.854844][T13060] ? fput+0x2d/0x130 [ 2120.858755][T13060] ? ksys_write+0x157/0x180 [ 2120.863308][T13060] __x64_sys_bpf+0x3d/0x50 [ 2120.867874][T13060] do_syscall_64+0x39/0x80 [ 2120.872373][T13060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2120.878278][T13060] RIP: 0033:0x465f69 [ 2120.882162][T13060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2120.901771][T13060] RSP: 002b:00007f7a860d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2120.910192][T13060] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 2120.918258][T13060] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2120.926243][T13060] RBP: 00007f7a860d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2120.934225][T13060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 10:02:19 executing program 1 (fault-call:0 fault-nth:1): bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) [ 2120.942244][T13060] R13: 00007ffc564cb86f R14: 00007f7a860d2300 R15: 0000000000022000 [ 2120.982257][T13062] CPU: 1 PID: 13062 Comm: syz-executor.2 Not tainted 5.12.0-rc2-syzkaller #0 [ 2120.991068][T13062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.001131][T13062] Call Trace: [ 2121.004452][T13062] dump_stack+0x137/0x19d [ 2121.008815][T13062] should_fail+0x23c/0x250 [ 2121.013248][T13062] should_fail_usercopy+0x16/0x20 [ 2121.018355][T13062] _copy_from_user+0x1c/0xd0 [ 2121.022981][T13062] __do_sys_bpf+0x143/0x9990 [ 2121.027633][T13062] ? kstrtoull+0x30e/0x350 [ 2121.032086][T13062] ? kstrtouint_from_user+0x104/0x130 [ 2121.032928][T13070] FAULT_INJECTION: forcing a failure. [ 2121.032928][T13070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2121.037661][T13062] ? __rcu_read_unlock+0x5c/0x250 [ 2121.055680][T13062] ? fsnotify_perm+0x59/0x2e0 [ 2121.060443][T13062] ? __fsnotify_parent+0x32f/0x430 [ 2121.065708][T13062] ? vfs_write+0x572/0x7e0 [ 2121.070129][T13062] ? __fget_light+0x219/0x260 [ 2121.074827][T13062] ? fput+0x2d/0x130 [ 2121.078717][T13062] ? ksys_write+0x157/0x180 [ 2121.083283][T13062] __x64_sys_bpf+0x3d/0x50 [ 2121.087774][T13062] do_syscall_64+0x39/0x80 [ 2121.092206][T13062] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2121.098157][T13062] RIP: 0033:0x465f69 [ 2121.102054][T13062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2121.121687][T13062] RSP: 002b:00007f08536d6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2121.130177][T13062] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 2121.138200][T13062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2121.146221][T13062] RBP: 00007f08536d61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2121.154201][T13062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2121.162178][T13062] R13: 00007ffffe816faf R14: 00007f08536d6300 R15: 0000000000022000 [ 2121.170187][T13070] CPU: 0 PID: 13070 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:19 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12000000}, 0x78) 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000, 0x3ff], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) [ 2121.179012][T13070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.189070][T13070] Call Trace: [ 2121.192349][T13070] dump_stack+0x137/0x19d [ 2121.196736][T13070] should_fail+0x23c/0x250 [ 2121.201157][T13070] should_fail_usercopy+0x16/0x20 [ 2121.206218][T13070] _copy_to_user+0x1c/0x90 [ 2121.210649][T13070] simple_read_from_buffer+0xab/0x120 [ 2121.216082][T13070] proc_fail_nth_read+0xf6/0x140 [ 2121.221029][T13070] ? rw_verify_area+0x136/0x250 [ 2121.225890][T13070] ? proc_fault_inject_write+0x200/0x200 10:02:19 executing program 2 (fault-call:0 fault-nth:1): bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2121.231532][T13070] vfs_read+0x154/0x5d0 [ 2121.235691][T13070] ? __fget_light+0x219/0x260 [ 2121.240408][T13070] ksys_read+0xce/0x180 [ 2121.244573][T13070] __x64_sys_read+0x3e/0x50 [ 2121.249100][T13070] do_syscall_64+0x39/0x80 [ 2121.253546][T13070] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2121.259452][T13070] RIP: 0033:0x4191ec [ 2121.263366][T13070] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9, 0x10000], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2121.283074][T13070] RSP: 002b:00007f7a860d2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2121.291505][T13070] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191ec [ 2121.299559][T13070] RDX: 000000000000000f RSI: 00007f7a860d21e0 RDI: 0000000000000003 [ 2121.307696][T13070] RBP: 00007f7a860d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2121.315666][T13070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2121.323657][T13070] R13: 00007ffc564cb86f R14: 00007f7a860d2300 R15: 0000000000022000 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8, 0x13b9], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x20000000}, 0x78) 10:02:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2121.356717][T13083] FAULT_INJECTION: forcing a failure. [ 2121.356717][T13083] name fail_usercopy, interval 1, probability 0, space 0, times 0 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2121.417372][T13083] CPU: 0 PID: 13083 Comm: syz-executor.2 Not tainted 5.12.0-rc2-syzkaller #0 [ 2121.426189][T13083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.436243][T13083] Call Trace: [ 2121.439540][T13083] dump_stack+0x137/0x19d [ 2121.443905][T13083] should_fail+0x23c/0x250 [ 2121.448327][T13083] should_fail_usercopy+0x16/0x20 [ 2121.453431][T13083] _copy_to_user+0x1c/0x90 [ 2121.457870][T13083] simple_read_from_buffer+0xab/0x120 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2121.463263][T13083] proc_fail_nth_read+0xf6/0x140 [ 2121.468229][T13083] ? rw_verify_area+0x136/0x250 [ 2121.473112][T13083] ? proc_fault_inject_write+0x200/0x200 [ 2121.478749][T13083] vfs_read+0x154/0x5d0 [ 2121.482917][T13083] ? __fget_light+0x219/0x260 [ 2121.487602][T13083] ksys_read+0xce/0x180 [ 2121.491778][T13083] __x64_sys_read+0x3e/0x50 [ 2121.496373][T13083] do_syscall_64+0x39/0x80 [ 2121.500792][T13083] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2121.506694][T13083] RIP: 0033:0x4191ec 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2121.510612][T13083] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2121.530221][T13083] RSP: 002b:00007f08536d6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2121.538650][T13083] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191ec [ 2121.546630][T13083] RDX: 000000000000000f RSI: 00007f08536d61e0 RDI: 0000000000000003 [ 2121.554601][T13083] RBP: 00007f08536d61d0 R08: 0000000000000000 R09: 0000000000000000 10:02:19 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6, 0x8], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:19 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x25000000}, 0x78) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2121.562573][T13083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2121.570547][T13083] R13: 00007ffffe816faf R14: 00007f08536d6300 R15: 0000000000022000 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2, 0x6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x48000000}, 0x78) 10:02:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:19 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6, 0x2], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:19 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4c000000}, 0x78) 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1, 0x6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 10:02:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:19 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:19 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x58000000}, 0x78) 10:02:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9, 0x1], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, 0x0, 0x0) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x60010000}, 0x78) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6, 0xfffffff9], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, 0x0, 0x0) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305, 0x6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x68000000}, 0x78) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6c000000}, 0x78) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2122.121771][T13175] FAULT_INJECTION: forcing a failure. [ 2122.121771][T13175] name fail_usercopy, interval 1, probability 0, space 0, times 0 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1, 0x305], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) [ 2122.175028][T13175] CPU: 0 PID: 13175 Comm: syz-executor.5 Not tainted 5.12.0-rc2-syzkaller #0 [ 2122.183839][T13175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2122.193896][T13175] Call Trace: [ 2122.197180][T13175] dump_stack+0x137/0x19d [ 2122.201543][T13175] should_fail+0x23c/0x250 [ 2122.206107][T13175] should_fail_usercopy+0x16/0x20 [ 2122.211139][T13175] _copy_from_user+0x1c/0xd0 [ 2122.215743][T13175] __do_sys_bpf+0x143/0x9990 [ 2122.220362][T13175] ? kstrtoull+0x30e/0x350 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4, 0x1], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe09, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2122.224784][T13175] ? kstrtouint_from_user+0x104/0x130 [ 2122.230161][T13175] ? __rcu_read_unlock+0x5c/0x250 [ 2122.235200][T13175] ? fsnotify_perm+0x59/0x2e0 [ 2122.239909][T13175] ? __fsnotify_parent+0x32f/0x430 [ 2122.245023][T13175] ? vfs_write+0x572/0x7e0 [ 2122.249491][T13175] ? __fget_light+0x219/0x260 [ 2122.254209][T13175] ? fput+0x2d/0x130 [ 2122.258118][T13175] ? ksys_write+0x157/0x180 [ 2122.262693][T13175] __x64_sys_bpf+0x3d/0x50 [ 2122.267117][T13175] do_syscall_64+0x39/0x80 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x4], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) [ 2122.271536][T13175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2122.277431][T13175] RIP: 0033:0x465f69 [ 2122.281348][T13175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2122.301082][T13175] RSP: 002b:00007f293eb88188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2122.309659][T13175] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 2122.317645][T13175] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 10:02:20 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40, 0x1], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x74000000}, 0x78) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xb, 0x0, 0x0) [ 2122.325634][T13175] RBP: 00007f293eb881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2122.333603][T13175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2122.341600][T13175] R13: 00007fff330d862f R14: 00007f293eb88300 R15: 0000000000022000 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2, 0x40], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x76010000}, 0x78) [ 2122.422540][T13202] FAULT_INJECTION: forcing a failure. [ 2122.422540][T13202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2122.448782][T13202] CPU: 0 PID: 13202 Comm: syz-executor.5 Not tainted 5.12.0-rc2-syzkaller #0 [ 2122.457570][T13202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2122.467683][T13202] Call Trace: 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7a000000}, 0x78) [ 2122.470965][T13202] dump_stack+0x137/0x19d [ 2122.475310][T13202] should_fail+0x23c/0x250 [ 2122.479807][T13202] should_fail_usercopy+0x16/0x20 [ 2122.484837][T13202] _copy_to_user+0x1c/0x90 [ 2122.489291][T13202] simple_read_from_buffer+0xab/0x120 [ 2122.494777][T13202] proc_fail_nth_read+0xf6/0x140 [ 2122.499723][T13202] ? rw_verify_area+0x136/0x250 [ 2122.504607][T13202] ? proc_fault_inject_write+0x200/0x200 [ 2122.510254][T13202] vfs_read+0x154/0x5d0 [ 2122.514419][T13202] ? __fget_light+0x219/0x260 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2122.519104][T13202] ksys_read+0xce/0x180 [ 2122.523270][T13202] __x64_sys_read+0x3e/0x50 [ 2122.527846][T13202] do_syscall_64+0x39/0x80 [ 2122.532284][T13202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2122.538195][T13202] RIP: 0033:0x4191ec [ 2122.542088][T13202] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2122.561802][T13202] RSP: 002b:00007f293eb88170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6, 0x0, 0x2], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x93000000}, 0x78) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8, 0x0, 0x6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) [ 2122.570250][T13202] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191ec [ 2122.578252][T13202] RDX: 000000000000000f RSI: 00007f293eb881e0 RDI: 0000000000000003 [ 2122.586248][T13202] RBP: 00007f293eb881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2122.594232][T13202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2122.602215][T13202] R13: 00007fff330d862f R14: 00007f293eb88300 R15: 0000000000022000 10:02:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e, 0x8], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xb, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x98030000}, 0x78) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b, 0x6e0e], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xff000000}, 0x78) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 10:02:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200, 0xa7b], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x78) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf, 0x200], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x78) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, 0x0, 0x0) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, 0x0, 0x0) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96, 0xaf], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4}, 0x78) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0, 0x96], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}, 0x78) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5, 0xd0], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, 0x0, 0x0) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7, 0x0, 0x5], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}, 0x78) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, 0x0, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7}, 0x78) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7, 0x7], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xb, 0x0, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8}, 0x78) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf09, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4, 0x7], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9}, 0x78) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40, 0x4], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xa}, 0x78) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000, 0x40], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, 0x0, 0x0) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3, 0x8000], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xb}, 0x78) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0xf0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0xf, 0x0, 0x0) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4, 0x3], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xc}, 0x78) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 10:02:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8, 0x5d4], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xd}, 0x78) 10:02:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x11, 0x0, 0x0) 10:02:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f, 0x8], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xe}, 0x78) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1c, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10}, 0x78) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81, 0x7f], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x11}, 0x78) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74, 0x81], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x12}, 0x78) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff, 0x6e74], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x25}, 0x78) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x15, 0x0, 0x0) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1c, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x48}, 0x78) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9, 0xffffffff], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8, 0x0, 0x9], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, 0x0, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4c}, 0x78) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5, 0x8], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, 0x0, 0x0) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x10) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x58}, 0x78) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3, 0x5], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x78) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x68}, 0x78) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800, 0x3], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x100a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x7800) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x19, 0x0, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb, 0x800], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6c}, 0x78) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, 0x0, 0x0) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x100b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x100000) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x74}, 0x78) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8, 0xfffffffb], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1b, 0x0, 0x0) 10:02:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x78000000) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x10) 10:02:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6, 0x8], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7a}, 0x78) 10:02:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x78) 10:02:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1c, 0x0, 0x0) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x7ffffffff000) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x7800) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100, 0x6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x1000000000000) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x93}, 0x78) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x100000) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x10000000000000) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x78000000) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, 0x0, 0x0) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x160}, 0x78) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1, 0x100], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xf0ffffff7f0000) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x176}, 0x78) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, 0x0, 0x0) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff, 0x1], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x7ffffffff000) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x7800000000000000) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6, 0x7fffffff], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x300}, 0x78) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500)='/dev/bsg\x00', 0x121280, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) recvmsg$can_j1939(r1, 0x0, 0x10180) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x440, 0xffffffff, 0x0, 0x138, 0x0, 0xffffffff, 0xffffffff, 0x370, 0x370, 0x370, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@empty, @dev={0xfe, 0x80, [], 0x19}, [0x0, 0x0, 0xff000000, 0xff], [0xff, 0xffffff, 0xffffff00, 0xff000000], 'wlan1\x00', 'virt_wifi0\x00', {0xff}, {}, 0xc398b261822590b1, 0xff, 0x6, 0x59}, 0x0, 0x100, 0x138, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d6, 0x4d4], 0x10001, 0x3}}, @common=@mh={{0x28, 'mh\x00'}, {"e323", 0x1}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x4, 0x0, 0x4}, {0x0, 0x3}, {0x1, 0x6, 0x3}, 0x1, 0x101}}}, {{@ipv6={@rand_addr=' \x01\x00', @private1, [0x0, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], 'lo\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0x5e, 0x2, 0x2, 0x15}, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x8, 'syz1\x00', {0x9}}}}, {{@ipv6={@local, @mcast1, [0xff, 0xffffff00, 0x0, 0xffffffff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'netdevsim0\x00', 'rose0\x00', {}, {0xff}, 0x67, 0x4, 0x4}, 0x0, 0x118, 0x148, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x61, 0x10}}, @common=@dst={{0x48, 'dst\x00'}, {0x5, 0x6, 0x0, [0x1ff, 0x9f5f, 0x8000, 0x6, 0x7, 0xfffd, 0x3, 0x80d, 0x6, 0x8, 0x0, 0x8, 0x534, 0x936d, 0x1ff, 0x49c], 0x7}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x51a, 0xfff, 0x40}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nvram\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f00000005c0)={0x0, 0x0, 0x6, 0x0, 0x1, 0x20, 0x3f, 0x10000, 0x401, 0x4, 0x2, 0x9}) recvmsg$can_j1939(r3, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000540)='SEG6\x00', r3) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, 0x0, 0x0) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x398}, 0x78) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x1000000000000) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1, 0xfe6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x10) 10:02:23 executing program 1: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@ll, &(0x7f0000000080)=0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x10000000000000) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1106, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000, 0x1], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x500}, 0x78) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x78) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xf0ffffff7f0000) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000040)=0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_STOP(r1, 0x5403) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@mcast2}, 0x14) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x7800) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6, 0x8000], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x600}, 0x78) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x7800000000000000) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001280)='/dev/vcs\x00', 0x365402, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001480)={0x0, @vsock={0x28, 0x0, 0xffffffff, @hyper}, @xdp={0x2c, 0x9, 0x0, 0x27}, @vsock={0x28, 0x0, 0x0, @my=0x0}, 0x3, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000001440)='vxcan1\x00', 0x14, 0x7fffffff, 0xff}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001500)={@private1, 0x23}) ioctl$sock_ifreq(r0, 0x8926, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_data=&(0x7f0000000000)="fde210c8a582a18256cd3299a7d1aafaad45bf33c99db0e988d2e734a7fb7f33"}) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x700}, 0x78) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x100000) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff, 0x6], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xa0) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x78000000) 10:02:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffe24) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2, 0x0, 0x1ff], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x900}, 0x78) 10:02:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xc3a7c8cc) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1109, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1, 0x2], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x7ffffffff000) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xa00}, 0x78) 10:02:23 executing program 2: syz_io_uring_setup(0x376d, &(0x7f0000000000)={0x0, 0xcb06, 0x8, 0x0, 0x1a8}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x20, &(0x7f0000000100), 0x0, 0x0, 0x1}, 0x1f) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x24) 10:02:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x9, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0x2, 0x8, 0xb, 0x18, 0x10}, @map={0x18, 0x4, 0x1, 0x0, 0x1}, @alu={0x7, 0x0, 0x2, 0x6, 0x8, 0x20, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xad}]}, &(0x7f0000000300)='GPL\x00', 0x7fffffff, 0x26, &(0x7f0000000340)=""/38, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0xd, 0x401, 0xffff}, 0x10}, 0x78) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@local, @in=@local}}, {{@in=@private}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) recvmsg$can_j1939(r1, &(0x7f00000008c0)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/194, 0xc2}, {&(0x7f0000000600)=""/207, 0xcf}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/159, 0x9f}], 0x4, &(0x7f0000000840)=""/91, 0x5b}, 0x22060) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000900)=0x5) syz_io_uring_setup(0x3b92, &(0x7f0000000140)={0x0, 0x3dc1, 0x1, 0x3, 0x270}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index=0x8, 0x9, 0x0, 0xff, 0x4}, 0x4) 10:02:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4, 0x1], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x1000000000000) 10:02:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x110a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xb00}, 0x78) 10:02:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 10:02:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x10000000000000) 10:02:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xffffffffffffff65) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x400000, 0x0) syz_io_uring_setup(0x2f62, &(0x7f0000000140)={0x0, 0xe2b0, 0x20, 0x2, 0x4000027f, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x2, 0x7, 0x8, 0x414, 0xffffffffffffffff, 0x8000, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x40) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x40045109, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000240)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@initdev, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0xcfd4], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x110b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xc00}, 0x78) 10:02:24 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000001c0)={0x67446698, 0x0, 0x0, 0x4, 0x1, "b725e2d651a15f1703fcc866aa3f549b69cafb4f59f77369620b3fa7b013f61857d5d3fe5aca71812d5924f646389a1b1959c700c5e4677d76901809e78581b52afa"}, 0x52) recvmsg$can_j1939(r1, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf8, 0x453, 0x300, 0x70bd28, 0x25dfdbfe, "96e75f096276291e2419e1926b3b6c02664a83c86f0699f24c5b7aba344333325da58780326ea08badd50c7e03346a870aa99960ecacf5624039477d3cb7e6658a66f49b5424c996c8e1abb70616e9ee99ff68de1f3cc591c3818af7782e4c4e9942c75a285995a50f09a96931489088ba1ad5fce46a37b0fc5fd0703f16d307c8d02d1646470807ca6099bb0f593ca88a2793aad4d3954edb4b46e2f70e7045f12a7afb248abfb8df98b39f0029763cdf385a405a97de07145401d1fe110f1a8bfcb096b5efe0059b9acaf747d36274c2914aff0dc1f77d2ab34d42eaee2f36c78256b7b3", ["", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x4090}, 0x24008000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xf0ffffff7f0000) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x110c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x6518404b28da8ec2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@map, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @generic={0x8, 0xc, 0x6, 0x1e17, 0x9}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe7, &(0x7f0000000200)=""/231, 0x41100, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x2, 0xcd7, 0x80000000}, 0x10, 0x1af83}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x3, 0x2, 0x7, 0x100, 0x4}, @alu={0x7, 0x0, 0x4, 0x0, 0x7, 0x18, 0x10}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x718, 0x0, 0x0, 0x40f00, 0x6, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x8, 0x8001, 0x6}, 0x10, 0x21106, r0}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r3, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008010}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000600)='logon\x00', &(0x7f0000000640)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000680)={0x0, "1986024a17b2de7a0dcd5e9b1d391d13cb79bcaf18a01b2ef66bf1a9e2456c1dc127340f8ccb04de5397f60cf7489fa3b97e126777b8321a71cebeb1b6ba9909", 0x1e}, 0x48, 0xfffffffffffffff9) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000740)='l2tp\x00', r1) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x24, r5, 0x202, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008040}, 0x10) request_key(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)='syzkaller\x00', r4) 10:02:24 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="3600d9477f0000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fedbdf25070000000500060081000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x48004) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0x80) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, 0x3f7, 0x100, 0x70bd29, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4900) syz_io_uring_complete(0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00', r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x12}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80000000}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8001}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xf8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}]}, 0x68}, 0x1, 0x0, 0x0, 0x54}, 0x840) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xd00}, 0x78) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x800, 0x4e21, 0x6, 0x2, 0xe0, 0xa0, 0x87}, {0x8000, 0x7, 0x2b96, 0x5, 0xffffffff80000000, 0x98, 0x3ff, 0x100000000}, {0x80000000, 0xfff, 0x8000, 0x80000000}, 0x2, 0x6e6bb1, 0x2, 0x1, 0x0, 0x3}, {{@in6=@local, 0x4d4, 0x2b}, 0x2, @in6=@private2, 0x3502, 0x4, 0x3, 0x7f, 0x6, 0x28de, 0x2}}, 0xe8) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000001680)=0x1024) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/175, 0xaf}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/244, 0xf4}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000500)=""/102, 0x66}], 0x5}, 0x8}], 0x1, 0x100, &(0x7f0000000600)={0x0, 0x989680}) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4, 0x0, 0x80000001], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x7800000000000000) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xe00}, 0x78) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b, 0x4], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x1, 0x1, 0x6, 0x7, 0x1, 0x8, 0x10}]}, &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xfb, &(0x7f0000000080)=""/251, 0x41100, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x7, 0xcef, 0x5}, 0x10}, 0x78) 10:02:24 executing program 2: sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x58}, 0x1, 0x0, 0x0, 0x40000080}, 0x800) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6378}, [@alu={0x0, 0x1, 0xb, 0x2, 0x3, 0xfffffffffffffff8}]}, &(0x7f0000000040)='syzkaller\x00', 0x23a5, 0x5f, &(0x7f0000000080)=""/95, 0x41000, 0x4, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x10, 0x7, 0x1}, 0x10, 0x28602}, 0x78) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2, 0x0, 0x3, 0xe, 0x4, "ac3d4bfa7e5c7687c7b56f829093852d7fb90f0c44a1d5b474b2280c31d2fdfff9ef06c8e38f9a1db9cfa30029dcb94b6a0540205f321be47a604ee3d9220e43", "1ee9529e8cb0c2f69571eb55b00412f378b5bfedc520a64dad1baef6b4cbfd71227fbcb71ca0dce46155294f44d8e0fb6d49aed51f22a3c8cc4534b92aff26d4", "d9db0a62a2cd93db2dd357d120e99c25416faab52b0676a1b7f1ef08b085ff71", [0x8, 0x1]}) 10:02:24 executing program 2: ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000000)={"ec48f921d1a225e580f4faf2c5b51563a724b7beb594f852b1a687793fa5", 0x84c, 0x889, 0xfff, [0x8303, 0xffff, 0x2, 0x9, 0x0, 0xfffffe01, 0x53, 0xfffff801, 0x5, 0x0, 0x3, 0x8, 0x10000, 0x8, 0x1, 0x0, 0xf0, 0x8]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2200, 0x0) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2, 0x0, 0xa12b], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 1: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x7800, 0x1, 0x3, 0x4110, {{0x46, 0x4, 0x3, 0x3, 0x118, 0x65, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@cipso={0x86, 0x52, 0x3, [{0x7, 0x6, "3137f810"}, {0x2, 0x12, "50c08cd4a6ddb219178ba272693fd689"}, {0x7, 0x2}, {0x2, 0xc, "c260592372bc6c9de12a"}, {0x7, 0x10, "6885e6e9a3c568d302364f35c0af"}, {0x1, 0xd, "ea0c05410bc58485be3746"}, {0x4, 0x9, "27758648403c76"}]}, @timestamp_prespec={0x44, 0xc, 0x70, 0x3, 0xd, [{@empty, 0x4}]}, @timestamp={0x44, 0x18, 0x1c, 0x0, 0x2, [0x3, 0x9, 0x0, 0x1, 0xf5]}, @rr={0x7, 0xb, 0x63, [@broadcast, @multicast2]}, @cipso={0x86, 0x3d, 0x3, [{0x2, 0x12, "14d92325790538e2552aa17614161ff1"}, {0x1, 0x2}, {0x2, 0x5, "43d90a"}, {0x0, 0xc, "06f7d8e1183e27859660"}, {0x6, 0x12, "559e54a0bbc3d26ba1f83280ff97aba7"}]}, @cipso={0x86, 0xf, 0x0, [{0x2, 0x9, "b9c69ba0f574fc"}]}, @rr={0x7, 0xf, 0x72, [@empty, @multicast1, @rand_addr=0x64010101]}, @timestamp={0x44, 0x20, 0xfc, 0x0, 0xd, [0xcb4b, 0x4, 0x800, 0x5, 0xa0, 0x80000001, 0x20]}, @timestamp={0x44, 0x8, 0xc8, 0x0, 0x2, [0x5]}]}}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffd32) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r1, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2008095}, 0x4c0c2) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x100, 0x70bd29, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x3]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8, 0x2], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1100}, 0x78) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000f703000129bd7000fd92e65e6f4013801accdf535c89c16b91dbdfa507000000090000002e2f66696c54ed85e1ce65302e2f66696c65300000"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20040004) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffc76) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f5, 0x8, 0x70bd28, 0xc58, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1200}, 0x78) 10:02:24 executing program 5: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1, 0x8], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffd97) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffeba) r0 = socket(0x5, 0xa, 0x10000) r1 = socket(0xa, 0x6, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000), 0x4) getpeername(r1, &(0x7f0000000140)=@hci, &(0x7f00000001c0)=0x80) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2000}, 0x78) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6, 0x1], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 5: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/186, 0xba}], 0x1, &(0x7f0000000180)=""/192, 0xc0}, 0x160) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffe1e) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2500}, 0x78) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695, 0x6], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x2000, 0x0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f0000000140)=0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x2d}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_DEBUG={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0xc854}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gretap0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x8, 0x10, 0x1, 0x7, {{0x6, 0x4, 0x0, 0x32, 0x18, 0x65, 0x0, 0x80, 0x4, 0x0, @private=0xa010101, @remote, {[@end]}}}}}) 10:02:24 executing program 1: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @private}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000180)=""/177, 0xb1}], 0x2, &(0x7f0000000280)=""/4096, 0x1000}, 0x295}, {{&(0x7f0000001280)=@ipx, 0x80, &(0x7f0000001500)=[{&(0x7f0000001300)=""/40, 0x28}, {&(0x7f0000001340)=""/229, 0xe5}, {&(0x7f0000001440)=""/186, 0xba}], 0x3}, 0xcd71}, {{&(0x7f0000001540)=@rc={0x1f, @none}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000015c0)=""/139, 0x8b}, {&(0x7f0000001680)=""/150, 0x96}, {&(0x7f0000001740)=""/75, 0x4b}], 0x3, &(0x7f0000001800)=""/118, 0x76}, 0x2}], 0x3, 0x22, &(0x7f0000001940)={0x0, 0x3938700}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffffffffff04) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db, 0xc695], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffcc5) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4800}, 0x78) 10:02:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x2d) 10:02:24 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2, 0xb2db], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x1ff, 0x7, 0x400, 0xa2, 0xffffffffffffffff, 0x7bee, [], 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x40) 10:02:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4c00}, 0x78) 10:02:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0xcb, &(0x7f00000001c0)=""/203, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x2, 0x80000001, 0x51fb54fb}, 0x10}, 0x78) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x21c0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xffffffffffffff74) 10:02:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffef4) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5, 0x2], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 5: syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x8, &(0x7f0000000000)=@generic={0x6, 0x0, 0x0, "38f53d35"}) ioctl$SNDCTL_SEQ_SYNC(0xffffffffffffffff, 0x5101) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5800}, 0x78) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x80) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, @sco, @tipc=@name={0x1e, 0x2, 0x1, {{0x42}, 0x2}}, @xdp={0x2c, 0x5, r0, 0x39}, 0xfc, 0x0, 0x0, 0x0, 0x800, &(0x7f00000000c0)='batadv0\x00', 0x7, 0x9, 0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)={0x4100c0, 0x0, 0x12}, &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x12345}, 0x7fff) bind$l2tp(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote, 0x1}, 0x10) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6, 0x5], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6001}, 0x78) 10:02:25 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xe, 0x1010, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(0xffffffffffffffff, 0x5111) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000500), 0x4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0x6, &(0x7f0000000540)=ANY=[@ANYRES16=r2, @ANYRES32=0x1, @ANYBLOB="000000000400000085100000faffffff9500000000000000"], &(0x7f0000000040)='GPL\x00', 0x200, 0x6a, &(0x7f0000000080)=""/106, 0x41000, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x9, 0x9, 0x1}, 0x10, 0x1d6aa, r2}, 0x78) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/175, 0xaf) r3 = add_key$fscrypt_v1(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000380)={0x0, "f04bdabc3205a70fbb5a15464976c30921c38ad6f74643d4c021c51b0227e1833ea4cd645cbfd0fd9413ab1f5a82b83b865486beb6567856e746ab9e690cb6a5", 0x10}, 0x48, 0xfffffffffffffffc) keyctl$get_security(0x11, r3, &(0x7f0000000400)=""/226, 0xe2) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f00000002c0)) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1209, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x10000) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x5cd0c0c0ef00bcf1, 0x0) recvmsg$can_j1939(r2, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="300101000000000000f2c0d48ed109f700", @ANYBLOB="b1ff0459af7052e0b4a825666d1b19120735c7d7b615c611b2752c7b29698928676ed3d4d3a00652b35e9cf4b3af85fd4e777550150f27c9be4b6c101c68dc7a3affe195472b32a090c22b920004c701d6c289f0530a430539b6b784bc9afb383fe223204d9bdf32b1297d858959a3a053cf102ef9538decc026e362c547b79a2294ab780c26c0a09376ee6519490615ad828a7e0671bee7cef24331c642fa38cde976e68637bb27c8035e6f276d40b2307b9c34556a0dad05959783377039284cf80d505cc5dcb965858821c9db8ff210cf5fbc3af732f96e5b215bbc14f21b952bf1e822d5", @ANYRESDEC=r2, @ANYRES32, @ANYBLOB="378b077317ab36e7f9784fd2d7c8d372ec34c4d30bed99615266413ca0cc9007c81c29b1ff156e195a486a2568d02b3e7859847cd1280cb0a54376d79f7db5d2ee0909a03da5b2e0cdcc8305b38ed066f8970b70a8f13003b46bbee90fcef8b825858d5b159e352368fbaa45ad4d8e0cbc84ab68e6fddd861fec2f0f6780a334b2aae52bad5f4e33e222999e101316ccdf6bcea64f78d4a7257dd265a1dc6a3c5407"], 0x30}, 0x1, 0x0, 0x0, 0x5010}, 0x4000094) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffda6) 10:02:25 executing program 2: ioctl$SNDCTL_TMR_SELECT(0xffffffffffffffff, 0x40045408) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001, 0x6], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x120a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6800}, 0x78) 10:02:25 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x8, 0x70bd29, 0x25dfdbfc, {0x1, 0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x200080c0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:25 executing program 1: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)=0x5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x3, 0x8, 0x200, 0x20, 0x1, 0x7fffffff, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x40) 10:02:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x4, 0x4, 0x40, 0xfffffffe}, {0x7, 0x1, 0x1, 0xfffffffb}]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x14, 0x4, 0x1, 0x80000000, 0x10, 0xffffffffffffffff, 0x7, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x9, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x93}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0xa, 0x2, 0x2, 0xfffffffffffffffe, 0x10}, @ldst={0x2, 0x0, 0x2, 0x8, 0x0, 0xffffffffffffffff, 0x8}, @generic={0x9e, 0x2, 0x3, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x51}], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x7, 0x8000, 0x7}, 0x10}, 0x78) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f6, 0x100, 0x70bd26, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x8024) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8, 0x0, 0x80000001], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x120b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8, 0x8], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6c00}, 0x78) 10:02:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private1}}, &(0x7f0000001740)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000001780)={0x3, 0x7fff, 0xfffffff9, 0x1, 0x1668, 0xffffffffffffffff, 0x6, [], r0, 0xffffffffffffffff, 0x1, 0x1}, 0x40) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x120c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/nvram\x00', 0x754eb3c732882fd8, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000017c0)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x3c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8040000}, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_ext={0x1c, 0x11, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xf4}, [@jmp={0x5, 0x1, 0x7, 0x7, 0x0, 0xffffffffffffffc0, 0x8}, @call={0x85, 0x0, 0x0, 0x7d}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0x0, 0x9, 0x1, 0xfffffffffffffff0}, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x5, 0x2, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f00000000c0)='GPL\x00', 0x400, 0x1d, &(0x7f0000000100)=""/29, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xa, 0x10000, 0x7}, 0x10, 0x2e385, r1}, 0x78) 10:02:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffe22) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000340)={&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)=""/138, 0x8a}, {&(0x7f0000000080)=""/55, 0x37}], 0x2}, 0x2) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x4) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@dev={0xfe, 0x80, [], 0x21}, 0x4e22, 0x0, 0x4e24, 0x3, 0xa, 0xa0, 0xa0, 0x67, r1, 0xee01}, {0x10001, 0xffffffff, 0x7, 0x3, 0x1b510f60, 0x0, 0x1, 0x1}, {0x7, 0xffff, 0x2, 0x6}, 0x2, 0x6e6bbe, 0x0, 0x0, 0x3, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d3, 0x6c}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x3, 0x3, 0x2, 0x9, 0x1, 0x5}}, 0xe8) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7400}, 0x78) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7, 0xfffffff8], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001700)={'syztnl0\x00', &(0x7f0000001600)={'ip_vti0\x00', 0x0, 0x8000, 0x40, 0x80, 0x9, {{0x2a, 0x4, 0x0, 0x9, 0xa8, 0x68, 0x0, 0x0, 0x29, 0x0, @empty, @rand_addr=0x64010101, {[@noop, @rr={0x7, 0x23, 0xb0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @dev={0xac, 0x14, 0x14, 0x37}, @private=0xa010102, @rand_addr=0x64010101]}, @timestamp={0x44, 0x10, 0x21, 0x0, 0x9, [0x8000, 0x0, 0x5]}, @lsrr={0x83, 0x17, 0xbb, [@dev={0xac, 0x14, 0x14, 0x1b}, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp={0x44, 0x14, 0x98, 0x0, 0x6, [0x80000000, 0x1, 0x0, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xa3, 0x3, 0x7, [{@broadcast, 0x9}, {@loopback, 0x200}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x100}, {@remote, 0x6}, {@local, 0x1}]}]}}}}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x80001, 0x0) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001740)='/dev/nvram\x00', 0x202080, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000000)=@raw=[@generic={0x4a, 0x5, 0x8, 0xdb, 0x10001}, @ldst={0x3, 0x3, 0x2, 0x6, 0x2, 0xfffffffffffffff0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7fff}, @generic={0x1, 0x9, 0xf, 0x1000, 0x3}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000080)=""/131, 0x40f00, 0x1e, [], r0, 0x0, r2, 0x8, &(0x7f0000001780)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000017c0)={0x1, 0x5, 0x20, 0x2}, 0x10}, 0x78) 10:02:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffffffffffffff2f) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7601}, 0x78) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4, 0x7], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)=""/75, 0x4b}, {&(0x7f0000000100)=""/105, 0x69}, {&(0x7f0000000180)=""/190, 0xbe}, {&(0x7f0000000240)=""/247, 0xf7}], 0x4, &(0x7f0000000380)=""/89, 0x59}, 0x9c7f14b4418c4ed9) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1301, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x4) 10:02:25 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6, 0x4], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:25 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x7, 0x8, 0x4, 0xc, 0xffffffffffffffff}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x27, &(0x7f0000000080)=""/39, 0x41100, 0x16, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0xb, 0x8000}, 0x10}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_ext={0x1c, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@alu={0x7, 0x0, 0x7, 0x7, 0x7, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0xd, 0x8, 0x4, 0xc, 0x8}]}, &(0x7f0000000240)='GPL\x00', 0x1, 0x1000, &(0x7f0000000280)=""/4096, 0x40f00, 0x16, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001280)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000012c0)={0x3, 0xa, 0x4, 0x1}, 0x10, 0x2e58, r0}, 0x78) 10:02:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1302, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfffffffffffffff1) 10:02:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7a00}, 0x78) 10:02:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xffffffffffffffdc) r0 = socket$inet6(0xa, 0x2, 0xfffffff9) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000001c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r4, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, [], 0x1}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x401}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xff80}]}, 0x6c}}, 0x20000000) bind$l2tp(r3, &(0x7f0000000200)={0x2, 0x0, @empty, 0x2}, 0x10) 10:02:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xca24937bbb17b168) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001, 0x6], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9300}, 0x78) 10:02:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000130000000000000006000000014d01000000800385100000fcffffff18000000010000000000000500040000850000008400000018300000040000000000000000000000cc32f4ff00000000850000008600000018320000030000000000000000000000183500000200000000000000e6ff0000185c00000300000000000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x95, &(0x7f0000000100)=""/149, 0x40f00, 0xe, [], 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xf, 0x3, 0x5}, 0x10}, 0x78) 10:02:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffffffffffbc) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000040)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffff8}, @call={0x85, 0x0, 0x0, 0x93}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x0, 0x0, 0x1}, @jmp={0x5, 0x1, 0xa, 0xb, 0xa, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}], &(0x7f00000000c0)='syzkaller\x00', 0x80, 0xb1, &(0x7f0000000100)=""/177, 0x41000, 0x10, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x4, 0x9}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x7, 0x8, 0x4}, 0x10, 0x2954b, r0}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'syztnl1\x00', &(0x7f0000001800)={'erspan0\x00', 0x0, 0x10, 0x20, 0x7f, 0x8, {{0x16, 0x4, 0x2, 0x1, 0x58, 0x68, 0x9, 0xb2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x18, 0x70, 0x0, 0x5, [0x2, 0x5, 0xa975, 0xfffffffb, 0x400]}, @ra={0x94, 0x4, 0x1}, @noop, @timestamp_addr={0x44, 0x1c, 0x1f, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xc1e}, {@broadcast, 0x33}, {@dev={0xac, 0x14, 0x14, 0xc}}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000018c0)={@private2, @dev={0xfe, 0x80, [], 0xf}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xff, 0x9, 0x0, 0x100, 0x2, 0x5010000, r3}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5, 0x80000001], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9803}, 0x78) 10:02:26 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) recvmsg$can_j1939(r1, 0x0, 0x10000) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x400000) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=@mangle={'mangle\x00', 0x1f, 0x6, 0x768, 0x410, 0x208, 0x2d8, 0x570, 0x208, 0x698, 0x698, 0x698, 0x698, 0x698, 0x6, &(0x7f0000000200), {[{{@uncond, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x59c187db, [0x7ff, 0x3], 0x5, 0x1, 0x2, [@private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, @local, @private2={0xfc, 0x2, [], 0x1}, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @private2={0xfc, 0x2, [], 0x1}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @multicast2}, @private1={0xfc, 0x1, [], 0x1}, @mcast1, @mcast1, @mcast2], 0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @private0={0xfc, 0x0, [], 0x1}, [0xff000000, 0x7f000080, 0xffffffff, 0xffffff00], [0xff, 0xff, 0xff000000, 0xffffff00], 'tunl0\x00', 'vcan0\x00', {0xff}, {}, 0x62, 0x8, 0x4, 0x66}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x9}}}, {{@uncond, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0x8, "962b", 0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xff, 0x9, @ipv6=@private2, 0x4e22}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}, {0x7, 0x4, 0x0, [0x8, 0x5, 0x4, 0x4, 0xcd6b, 0x9c88, 0x5e, 0x80, 0xec9a, 0xc, 0x5, 0x1, 0x101, 0x8000, 0x7, 0x6], 0x5}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xe}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@local, @ipv6=@mcast1, 0x25, 0x38, 0x3ca1}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x2a}, @loopback, [0x0, 0x0, 0xffffff00, 0xff000000], [0x0, 0xff000000, 0x0, 0xffffff00], 'veth1_to_team\x00', 'veth0\x00', {0xff}, {0xff}, 0x3a, 0x0, 0x5, 0x6}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d4, 0x4d5], 0x9f8, 0x8, 0x2}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xc0}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x8a, &(0x7f0000000100)=""/138, 0x41000, 0x1, [], r3, 0x0, r4, 0x8, &(0x7f0000000440)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x5, 0x0, 0x3f}, 0x10}, 0x78) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b40)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x92}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x40}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24004800}, 0x800) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xff00}, 0x78) 10:02:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4a201, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x101, 0x40, 0x1ff}) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200, 0x0, 0x5], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x4, 0x7, 0x80000000, 0x5, 0x404, 0x1, 0xaf8d, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x1, 0xd, 0x0, 0xb, 0x0, 0x10}, @map={0x18, 0x6, 0x1, 0x0, r1}, @alu={0x7, 0x1, 0xa, 0x0, 0x2, 0xffffffffffffffc0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xffff}, @ldst={0x0, 0x2, 0x1, 0x2, 0x7, 0x1, 0x4}]}, &(0x7f00000002c0)='GPL\x00', 0xfffffffa, 0x68, &(0x7f0000000300)=""/104, 0x41000, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x1, 0x7, 0x10000}, 0x10}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) socket$l2tp6(0xa, 0x2, 0x73) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xb}], &(0x7f0000000040)='syzkaller\x00', 0x80000001, 0x45, &(0x7f0000000080)=""/69, 0x40f00, 0x9, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0xe, 0x3ff, 0xb9b}, 0x10}, 0x78) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5, 0x200], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x200000}, 0x78) 10:02:26 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'syzkaller1\x00'}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1000000}, 0x78) 10:02:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x1, &(0x7f0000000280)=@raw=[@jmp={0x5, 0x0, 0x1, 0x2, 0x6, 0x80, 0xffffffffffffffff}], &(0x7f0000000040)='syzkaller\x00', 0xb41, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x2, 0xff, 0x4}, 0x10}, 0x78) 10:02:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x2a) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400600, 0x0) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2000000}, 0x78) 10:02:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x7e55) 10:02:26 executing program 2: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000000)=0x3f, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xe2ff01fa328130ef) 10:02:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x31) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)=@can={0x1d, 0x0}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/92, 0x5c}, {&(0x7f0000000280)=""/17, 0x11}], 0x2}, 0x1a161) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xffffff01}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffff8}]}, &(0x7f0000000040)='syzkaller\x00', 0x1ff, 0x17, &(0x7f0000000080)=""/23, 0x41000, 0x0, [], r0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x10, 0x1, 0x1de}, 0x10, 0xffffffffffffffff}, 0x78) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d, 0x5], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1308, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3000000}, 0x78) 10:02:26 executing program 1: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'ip6erspan0\x00', @ifru_settings={0x0, 0x0, @sync=&(0x7f0000000000)={0x4, 0x7f, 0x5}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101201, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f000000e040)={0x0, @l2tp={0x2, 0x0, @loopback, 0x1}, @xdp={0x2c, 0xd, 0x0, 0x14}, @l2tp={0x2, 0x0, @private=0xa010102, 0x1}, 0x5, 0x0, 0x0, 0x0, 0x8, &(0x7f000000e000)='veth0_to_team\x00', 0x8, 0x5, 0xcaf}) r2 = openat$mice(0xffffffffffffff9c, &(0x7f000000e0c0)='/dev/input/mice\x00', 0x80200) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000e180)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @exit, @map={0x18, 0x5, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @ldst={0x3, 0x2, 0x2, 0x2, 0xb, 0x6, 0xffffffffffffffff}], &(0x7f00000000c0)='GPL\x00', 0x460, 0xcf, &(0x7f0000000100)=""/207, 0x41100, 0x1, [], r1, 0x1b, r2, 0x8, &(0x7f000000e100)={0x1, 0x4}, 0x8, 0x10, &(0x7f000000e140)={0x4, 0x1, 0xa6}, 0x10}, 0x78) ioctl$SNDCTL_SEQ_CTRLRATE(0xffffffffffffffff, 0xc0045103, &(0x7f0000000000)) 10:02:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xff2e) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x42000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) getsockname$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7, 0x39d], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1309, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4000000}, 0x78) 10:02:26 executing program 1: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x80c0) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:26 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x40, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x440}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x204000, 0x0) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000a40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)={0x43c, 0x3f3, 0x20, 0x70bd27, 0x25dfdbfe, {0x6, 0x1, 0x40, [0x200, 0x400, 0x2, 0x5, 0x4, 0x4, 0x7, 0x2, 0xffffffff, 0x101, 0x6, 0x8001, 0x7, 0x81, 0xe4, 0x1000, 0x7ff, 0x0, 0xffff, 0x4a54, 0x8, 0xeb, 0x59, 0x3, 0x4, 0x6de, 0x40, 0x1000, 0x0, 0x6, 0x8, 0x0, 0x7, 0x7, 0x0, 0x0, 0x8, 0xffffffff, 0x4, 0x2, 0x40, 0x7fff, 0xfffffff7, 0x503, 0x8, 0x8, 0x101, 0x4, 0x3, 0x7f3a, 0x8, 0xffff, 0xc2, 0x5, 0x5, 0x5, 0x9cd7, 0x3, 0x2, 0x7fff, 0xfff, 0xc6, 0x6, 0x2], [0x4, 0x9, 0xfffff7e8, 0x1, 0x0, 0x8, 0x40000, 0x1f, 0xffffffff, 0x9, 0x1, 0x7, 0xb6e, 0x9, 0x81, 0x1, 0x3, 0x8, 0x7, 0x5, 0x409, 0x6, 0xff, 0x1ff, 0x71f2, 0x8001, 0x41, 0x42c9, 0xc5cd, 0x6, 0x0, 0x6, 0x9, 0x800, 0x7, 0x1, 0x6, 0x2, 0x80, 0x3ff, 0x401, 0x81, 0x1, 0x1, 0x100, 0xb6, 0x1, 0x3f, 0x0, 0x80000000, 0x6, 0x3, 0x3d98, 0x1, 0x3, 0x5, 0x5, 0x8000, 0x6, 0x3ff, 0xaa1, 0x1, 0xfffff9e8, 0x7], [0x0, 0x5, 0x1000, 0x3f, 0x9, 0x2, 0x7, 0x80000001, 0x80000001, 0x8, 0x4, 0x5af56a55, 0x1, 0x4, 0x4, 0x8, 0x80000001, 0x8, 0x5, 0x80000000, 0x80000000, 0x0, 0x81, 0x0, 0x800, 0x4, 0x5, 0x4, 0x3, 0x40, 0x7fff, 0x73b, 0x10000, 0x272, 0xfffffffc, 0x7ff, 0x4, 0x7, 0x3, 0x7, 0x3f, 0x7, 0x4, 0x400, 0x8000, 0x2, 0x8001, 0x4, 0x9, 0x3, 0x1, 0x34, 0x101, 0x5, 0x2, 0xffffffff, 0xb2c, 0x608cc896, 0xfff, 0xfffffffb, 0x6, 0xe1, 0x1, 0x200020], [0x4, 0x8000, 0x4, 0xa1e, 0x1, 0x0, 0x401, 0x0, 0x6, 0x1, 0xd1, 0x9, 0x80c, 0x4d, 0xfffffe01, 0x6, 0x7, 0x197a, 0x200, 0x5, 0x20, 0x6, 0x0, 0x3, 0x0, 0xe4, 0x0, 0xfffffff9, 0x8, 0x9, 0x7f, 0x3, 0x80000, 0x20, 0x329d, 0x8, 0x40, 0xfffffffe, 0x1, 0x0, 0x6, 0xfffffffa, 0x3ff, 0x7ff, 0x0, 0x3, 0x1, 0x4, 0x9, 0x5, 0xfc41, 0x0, 0x9, 0x8, 0x2, 0x4f0, 0x7, 0x0, 0x800, 0x1, 0xe7d, 0x6, 0xf3, 0x2], 0x1c, ['/\x00', '/dev/bsg\x00', '&\x00', '\x00', ']H\'(.%\x00', '\x00', '#!]\x00', '&\x00']}, ["", "", "", "", "", "", "", "", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x28000000}, 0x8800) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x130a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x18}, @exit, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @generic={0x2, 0x0, 0x2, 0x6, 0x6}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x46, 0x1000, &(0x7f00000000c0)=""/4096, 0x40e00, 0x1b, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000010c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001100)={0x1, 0x6, 0x7, 0x6}, 0x10}, 0x78) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f, 0x7], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5000000}, 0x78) 10:02:26 executing program 5: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/bsg\x00', 0x400200, 0x0) recvmsg$can_j1939(r1, &(0x7f00000007c0)={&(0x7f0000000500)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000580)=""/95, 0x5f}, {&(0x7f0000000600)=""/64, 0x40}, {&(0x7f0000000640)=""/53, 0x35}, {&(0x7f0000000680)=""/132, 0x84}], 0x4, &(0x7f0000000780)=""/29, 0x1d}, 0x40000000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x408, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x338, 0xffffffff, 0xffffffff, 0x338, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@private2, @rand_addr=' \x01\x00', [0xff000000, 0xffffffff, 0xffffff], [0xffffff00, 0xff000000, 0x0, 0xff], 'bridge_slave_0\x00', 'bond_slave_1\x00', {0xff}, {0xff}, 0x67, 0xff, 0x3}, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x5, [0xffffffff, 0x1], 0x8, 0x8, 0x6, [@remote, @dev={0xfe, 0x80, [], 0x3c}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private1={0xfc, 0x1, [], 0x1}, @local, @rand_addr=' \x01\x00', @private1, @dev={0xfe, 0x80, [], 0x2d}, @dev={0xfe, 0x80, [], 0x2a}, @local, @private2={0xfc, 0x2, [], 0x1}, @private1, @ipv4={[], [], @broadcast}, @local, @ipv4={[], [], @loopback}], 0x10}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x10000}}}, {{@uncond, 0x0, 0xd0, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xe}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xff000000, 0xff000000, 0xff, 0xff000000], 0x4e21, 0x4e21, 0x4e23, 0x4e20, 0x83e6, 0x896, 0x6, 0x1, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x468) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffffffffffffff76) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x130b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x3) getuid() 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8, 0x7f], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xffffff5b) 10:02:26 executing program 1: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x0) process_madvise(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000000)="6906b47ab60e82f8d8b15fe8c244df8dd8ae2c3820343feff6a79b16d33f0ee4c9bbd0216414e2ffd91474", 0x2b}, {&(0x7f0000000040)="b3bf227958ca3b85edce8a18f947819fbea6f06976c3640fa835410457ee73f0ffac3bf7ff7f14784e3803edc9836730d3dd531d9ca492e484eea7190acad1c151ddbec44388296d4f745e38294c993e12a96d570a868b23fbd33437883c212804ff96ca24e131e9038160fa7bc758f142cb38f6", 0x74}, {&(0x7f00000000c0)="b95c3f7564cae31dfa607accf9798c02abbd5b6bae7a37fde8726fcc57b55893ebb7a744d96cb02000b0d44e98c822b3f7c91ad46e12c8ef4770468f3909e4a2ac7227cc57f4cbfd878ca8dcea40c0703d23dd4ab3373ded593f684e414371893212de47451f0fb85c3ed2e3c465379b46b7d42a005ac797bf92779b998c0a01d09925d8", 0x84}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1e07e4fb462619af2e1e66e89f9c9466e74923e06ae15be846d6f7b118e8e7fce3d99e5a30e410f652abdee78c13436b4c5b637a861712104d6224b39a951aefd398d812ac9e8de682d5536f0118e2d27e92ed54382afad7259cfb630228d12fd75ea0c2d95f01363c0a9c8be2b75f1385371f4be042e2dafeb071d133986e99ff1eff7f5f16e75703282c2c", 0x8c}, {&(0x7f0000001240)="98e075c98757081730fdb5c6935d411fcd6e776626c306f440b1af42c40b117c9cf944987102e83a7030f8507e53dfe8cd3e536f1e9fc04917ef148d182558d88a0927710d531d976ec8d2c0324824168f18fd7bc5388effe9ee483b0cea07292e4dc0667839020d8202e306829ed2b88db543ce002cd3ed40bace92cb35a93c786b5ed29a0859191fce31addf3d4d08269bb3ec518b1709d8504b70e8cc38cbe88388", 0xa3}, {&(0x7f0000001300)="99eeaa0e9e827e61a856f671f57f6f9e8b92ce93cbc03dac7a7cd43733e7e63c3c5804b8617adfd1654ada9d49c799b8a7d3a5a55871532b34c8db4717d5311f1ec78cc50e498fb4b1f28d0239d03df3d2efdb2b8639bb07a34b69453bca5642781af62459dbdea860e9c32a62291d3326dfb3e07cef490f727def6f45d4d231be54d77226d35d555423b1a22943630bc34b219717ad1908a7794c111bfcce640a0eceb6f25a100aaa5f40e973d6acf137f40cc638dd73a54ac4e2da0e5cca1ca04e000be4c94b8bde8f9ac76f1bbab3efa06d7e88f72829e829d2f12a02f360376e564a62f0132bbdf30247bd9623cade560bc0", 0xf4}], 0x7, 0x1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:26 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6000000}, 0x78) 10:02:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="c8735c899e1a6afaeef3cc", 0xb, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a, 0x8], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x130c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x42) 10:02:26 executing program 5: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000007580)=@can={0x1d, 0x0}, &(0x7f0000007600)=0x80) openat$nvram(0xffffffffffffff9c, &(0x7f00000026c0)='/dev/nvram\x00', 0x248000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000007640)={0x1b, 0x1, 0x1, 0xb, 0x8, 0xffffffffffffffff, 0x8000, [], r2, r1, 0x1, 0x3, 0x2}, 0x40) recvmsg$can_j1939(r1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/180, 0xb4}, {&(0x7f00000011c0)=""/5, 0x5}, {&(0x7f0000001200)=""/138, 0x8a}], 0x4, &(0x7f0000001300)=""/77, 0x4d}, 0x1}, {{&(0x7f0000001380)=@l2tp6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000002500)=[{&(0x7f0000002bc0)=""/128, 0x80}, {&(0x7f0000001480)=""/86, 0x56}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x3, &(0x7f0000002540)=""/214, 0xd6}, 0x400}, {{&(0x7f0000002640)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000002740), 0x0, &(0x7f0000001400)=""/101, 0x65}, 0x200}, {{&(0x7f0000002800)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000002880)=""/113, 0x71}, {&(0x7f0000002900)=""/72, 0x48}, {&(0x7f0000002980)=""/97, 0x61}], 0x3, &(0x7f0000002a40)=""/118, 0x76}, 0x7}], 0x4, 0x40000000, 0x0) getsockopt$inet6_int(r1, 0x29, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:02:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7000000}, 0x78) 10:02:26 executing program 2: setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x802, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0]}) 10:02:26 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:26 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48040}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x9) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'veth0_to_team\x00', @ifru_addrs=@hci}}) 10:02:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20, 0x0, 0x3af31b3a], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8000000}, 0x78) 10:02:27 executing program 2: io_uring_setup(0x1ac4, &(0x7f0000000000)={0x0, 0x34cb, 0x8, 0x0, 0x365}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) recvmsg$can_j1939(r0, &(0x7f0000001440)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/68, 0x44}, {&(0x7f0000001240)=""/138, 0x8a}, {&(0x7f0000001300)=""/208, 0xd0}], 0x4}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000001480)={0x2, 0x1, 0x9, 0x1, 0x7}, 0xc) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80000, 0x5b) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000001580)={0xe0002009}) 10:02:27 executing program 1: r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000640)=""/71, 0x47) keyctl$negate(0xd, 0x0, 0x714, r0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@private0, 0x32}) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488, 0x20], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9000000}, 0x78) 10:02:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xff59) 10:02:27 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x601, 0x0) getsockname$l2tp(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:27 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRESHEX=r0], 0x28}, 0x1, 0x0, 0x0, 0x20000010}, 0x4004990) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2200, 0x0) recvmsg$can_j1939(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be, 0x1488], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 1: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000)=0x400, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xa000000}, 0x78) 10:02:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000000)={"e41888c2f0bf592a9715b1bdfe5c710ea321d0e50df8badf2f7291cd5dae", 0x7, 0xffff, 0x3, [0x80000001, 0x4, 0x4, 0x40, 0x1, 0x9, 0x1, 0x9, 0x400, 0x7, 0x3, 0x3, 0x7ff, 0x7ff, 0x7fff, 0x10001, 0x6, 0x7f]}) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001, 0xc6be], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = socket$inet_icmp(0x2, 0x2, 0x1) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x4) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@empty, 0x4e23, 0x8, 0x4e24, 0x6, 0xa, 0x0, 0x180, 0x11, r2, 0xee01}, {0x40, 0x4, 0x7, 0x6, 0xffffffffffffffe8, 0x0, 0x6, 0x7f}, {0x0, 0x4, 0xe5, 0x7fffffff}, 0x3, 0x6e6bb0, 0x0, 0x1, 0x3, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x2b}, 0xa, @in6=@loopback, 0x3500, 0x3, 0x2, 0xff, 0x401, 0x10001, 0x400}}, 0xe8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xb000000}, 0x78) 10:02:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffedc) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000500)={'erspan0\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x20, 0x20, 0x4, 0x1, {{0x6, 0x4, 0x1, 0x28, 0x18, 0x66, 0x0, 0x3a, 0x4, 0x0, @multicast2, @local, {[@ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x5, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x401}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @alu={0x7, 0x0, 0x9, 0xb, 0x4, 0xffffffffffffffe0, 0x4}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x1, 0x3, 0x9}, 0x10}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x0, @nfc={0x27, 0x0, 0x0, 0x2}, @xdp={0x2c, 0xc, 0x0, 0x31}, @vsock={0x28, 0x0, 0xffffffff, @host}, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)='ip_vti0\x00', 0x8, 0x4, 0xfff7}) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xc000000}, 0x78) 10:02:27 executing program 5: syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x5331, 0x400800) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r0, &(0x7f0000000180)=@encrypted_load={'load ', 'default', 0x20, 'user:', '@^', 0x20, 0x200000000, 0x20, [0x65, 0x39]}, 0x2d, 0xfffffffffffffffd) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$get_security(0x11, r1, &(0x7f0000000000)=""/248, 0xf8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xc) r2 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r2, &(0x7f0000000640)=""/71, 0x47) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='m--!$.^-[*^{+\x00', r2) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r3, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x74, 0x453, 0x200, 0x70bd2b, 0x25dfdbfe, "f156f5195c42801fab3d1bc592736399a86328a9532bb960f97c6a72b26b8d928f1d401c4a2e9214be58e8fcb051ae196e78fbec4469eb813391f9065ef6c010b22fbf79d2da82747f131b2b446b445a1c180d3aea2a7a95c87d35026fb8e83c8b1b", [""]}, 0x74}, 0x1, 0x0, 0x0, 0x4000484}, 0x20000010) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a, 0x10001], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xd000000}, 0x78) 10:02:27 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x62, 0xa59dcef62b76466d, 0x0, 0x34, 0x41, 0x38, 0x33, 0x33, 0x30, 0x64, 0x35, 0x61, 0x30, 0x62, 0x64]}, &(0x7f0000000080)={0x0, "49823aeb5e7f5d0c1d1966a161e31ec126873b4688664ab5e67246599bc31b92edfe4f3529e900019f8fa7ab5066c15d795bd0e280b7c61c9896493ebcf721e9", 0x19}, 0x48, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, &(0x7f0000000100)=""/226, 0xe2) add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfffffffffffffd74) 10:02:27 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xfefc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x700, 0x70bd27, 0x25dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/168, 0xa8) ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x3ba) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffffffffff98) ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000040)=0x55) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x400000, 0x0) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3, 0xa0a], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xe000000}, 0x78) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffffffffffffffdd) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x1000, 0x1f, 0xe4, 0xdc5}, {0x6, 0x7f, 0x0, 0xd11}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0xd, 0x3, 0x8, 0x1, 0x10}, @alu={0x4, 0x0, 0x2, 0x7, 0x8, 0x18, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x4a, 0x87, &(0x7f0000000080)=""/135, 0x40f00, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xf, 0x4, 0x7fff}, 0x10}, 0x78) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x408100, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000040)={0x0, 0x2, 0x9, 0x100, 0x4af, 0x9, 0x800, 0x0, 0x8, 0x20, 0x9, 0x80000000}) socket$nl_generic(0x10, 0x3, 0x10) 10:02:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfffffffffffffddd) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002840)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002780)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/175, 0xaf}, {&(0x7f0000000140)=""/209, 0xd1}], 0x2, &(0x7f0000000280)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000001280)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000002480)=[{&(0x7f0000001300)=""/138, 0x8a}, {&(0x7f00000013c0)=""/189, 0xbd}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x3, &(0x7f00000024c0)=""/179, 0xb3}, 0x10001}, {{&(0x7f0000002580)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002900)=""/237, 0xed}], 0x1, &(0x7f0000002740)=""/32, 0x20}, 0xffffffff}], 0x3, 0x12003, &(0x7f0000002880)={r1, r2+10000000}) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10000000}, 0x78) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7, 0xdaf], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff7}, [@func, @ldst={0x3, 0x3, 0x0, 0xb, 0x9, 0x80, 0x10}, @jmp={0x5, 0x1, 0x4, 0x3, 0xf, 0x4, 0x1}, @generic={0x3, 0x3, 0x9, 0x8, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8001}, @call={0x85, 0x0, 0x0, 0x41}, @generic={0x9, 0x1, 0x4, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x3ff}, @jmp={0x5, 0x0, 0xa, 0x6, 0x0, 0x1, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xa, 0xb, 0x1, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x29, &(0x7f00000000c0)=""/41, 0x41100, 0x13, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x2, 0xffff8001}, 0x10}, 0x78) r0 = syz_io_uring_complete(0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x29}) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1407, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x11000000}, 0x78) 10:02:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240001, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x8001}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x120cc3dce2a19543, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x94, &(0x7f00000000c0)=""/148, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x9, 0xff, 0x3}, 0x10}, 0x78) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={0x0, @isdn={0x22, 0x6f, 0x7, 0x1, 0x9}, @can={0x1d, 0x0}, @nl=@unspec, 0x8, 0x0, 0x0, 0x0, 0x242, &(0x7f0000000500)='ip6tnl0\x00', 0x0, 0x5, 0x4}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000640)='/dev/bsg\x00', 0x300, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x5, &(0x7f0000000780)=@raw=[@ldst={0x3, 0x2, 0x2, 0x4, 0x2, 0x2, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @jmp={0x5, 0x0, 0x1, 0xb, 0x5, 0xfffffffffffffffe, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f00000007c0)='GPL\x00', 0x9, 0x41, &(0x7f0000000800)=""/65, 0x41100, 0x8, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000880)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x3, 0x6, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffe0, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @ldst={0x2, 0x0, 0x1, 0x7, 0xb, 0xfffffffffffffff0, 0xfffffffffffffff0}]}, &(0x7f00000003c0)='GPL\x00', 0x7f, 0xd9, &(0x7f0000000400)=""/217, 0x40f00, 0x16, [], r1, 0x19, r0, 0x8, &(0x7f0000000700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x8, 0x1170, 0x81}, 0x10, 0x28f6e, r3}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000280)=@raw=[@jmp={0x5, 0x1, 0x1, 0x9, 0x1, 0xfffffffffffffff8, 0x7fffffffffffffff}, @ldst={0x2, 0x1, 0x3, 0x5, 0x0, 0x20, 0x1}], &(0x7f00000002c0)='syzkaller\x00', 0xe5eb, 0x67, &(0x7f0000000300)=""/103, 0x41000, 0x1, [], r1, 0x1c, r0, 0x8, &(0x7f00000005c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x8, 0x5, 0x8}, 0x10, 0x46dd, r2}, 0x78) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x7], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 5: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x9) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000080)=0x4) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x2d) getegid() pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x2000c0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000280)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r2}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3ff}], &(0x7f0000000040)='GPL\x00', 0xfffffffb, 0xa5, &(0x7f0000000080)=""/165, 0x40f00, 0x10, [], 0x0, 0x1a, r0, 0x8, &(0x7f0000000140)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x6, 0x1, 0x1}, 0x10, 0x1862, r1}, 0x78) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x12000000}, 0x78) 10:02:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000000c0)={'wpan3\x00'}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x64800}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:27 executing program 5: r0 = request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='syz', 0xffffffffffffffff) keyctl$negate(0xd, r0, 0x803, r0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='host1x_syncpt_wait_check\x00'}, 0x10) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "e96be47293478ddbbabf57f919757d198bf093735ff04ede220eb62fa6c21e4a32d59997f69196bfcc4874f5be826b211a5833ccf130abee71086f90b7e51a6b", 0x37}, 0x48, r1) r2 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r2, &(0x7f0000000640)=""/71, 0x47) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r2) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1, 0x2], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@mcast2, 0x15}) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x200, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4ca400, 0x0) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:27 executing program 1: socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4, 0x1], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x20000000}, 0x78) 10:02:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffcdb) 10:02:27 executing program 5: sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x200, 0x70bd26, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x28000010}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xfe00}]}, 0x34}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000004) 10:02:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x140a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2, 0x4], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x25000000}, 0x78) 10:02:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200, 0x0) 10:02:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x31039ef03bf8385b) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4={[], [], @multicast1}, 0x6d}) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x140b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffe37) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x8, 0x5, 0x100, 0xb, 0x1, 0xab11, [], 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x40) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000240)={'gre0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x8, 0x8000, 0x0, 0x4, {{0x6, 0x4, 0x1, 0xe, 0x18, 0x67, 0x0, 0x3, 0x29, 0x0, @empty, @broadcast, {[@noop]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2b}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xd831, 0x0, 0x0, 0x0, 0xb6}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x0, 0x2, 0x0, 0xa, 0xd, 0x6}, @generic={0x5, 0x2, 0x9, 0x9, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xfa, &(0x7f0000000100)=""/250, 0x40f00, 0x4, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xd, 0x6, 0x7}, 0x10}, 0x78) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x48000000}, 0x78) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff, 0x2], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x140c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)={0x20000011}) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f00000001c0)=0xffffffff, 0x4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit, @exit, @generic={0x17, 0x5, 0x8, 0x1, 0x800}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @generic={0x2, 0x8, 0xd, 0xfa13, 0x4}, @call, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffffe}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x19, [], 0x0, 0x0, r2, 0x8, &(0x7f00000000c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x4, 0x3, 0x2, 0x9}, 0x10}, 0x78) 10:02:28 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000600)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000680)=0x80) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x4}, @ldst={0x3, 0x2, 0x1, 0x4, 0x3, 0x2, 0xfffffffffffffffc}], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x5a, &(0x7f0000000100)=""/90, 0x0, 0x4, [], r1, 0x17, r2, 0x8, &(0x7f00000006c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0x1, 0x6, 0x7}, 0x10, 0xe11c, r0}, 0x78) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@private2={0xfc, 0x2, [], 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', 0x2, 0x3f2, 0x4, 0x0, 0x400, 0x102, r1}) 10:02:28 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r0}, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x800, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000040)={@empty, 0x5b}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in=@private, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @rand_addr=0x64010102}, @in6=@private2, 0x4e23, 0x400, 0x4e21, 0x81, 0x2, 0x20, 0x0, 0xff, r2, r3}, {0x100000000, 0x3, 0x6, 0x5, 0x9, 0x10001, 0x7fffffff, 0x5}, {0x7ff, 0x2, 0x7, 0x2f}, 0x5, 0x6e6bb5, 0x0, 0x1, 0x0, 0x1}, {{@in=@remote, 0x4d6, 0x3c}, 0xa, @in=@remote, 0x0, 0x4, 0x1, 0x2b, 0x200, 0x8, 0x7}}, 0xe8) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4c000000}, 0x78) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1, 0xffff], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x2) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000002000)=0x0, &(0x7f0000002040)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000002080)='/dev/null\x00', 0x404040, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x18, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfff}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x0, 0x5, 0x6, 0x4, 0xfffffffffffffffc, 0xfffffffffffffffc}]}, &(0x7f0000000040)='GPL\x00', 0x1d6a, 0x81, &(0x7f0000000080)=""/129, 0x40f00, 0x3, [], r0, 0x0, r1, 0x8, &(0x7f00000020c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000002100)={0x4, 0xf, 0x4, 0xb7}, 0x10}, 0x78) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x58000000}, 0x78) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81, 0x1], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000002, 0x4042052, 0xffffffffffffffff, 0x10000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:28 executing program 2: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x11}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x20014001) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80001, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x84ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1ff}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040}, 0x800) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:28 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) syz_io_uring_setup(0x7a62, &(0x7f0000000000)={0x0, 0x8206, 0x1, 0x3, 0x2e6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r3 = syz_io_uring_complete(r1) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x4, 0x0, r3, &(0x7f00000001c0)={0x12080, 0x0, 0x5}, &(0x7f0000000200)='./file0\x00', 0x18, 0x0, 0x23456}, 0xbac) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000140)={r4, r5+60000000}, 0x1, 0x1}, 0x9) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x60010000}, 0x78) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff, 0x81], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xe1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffff}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x1) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x8001) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x101000, 0x0) pidfd_getfd(r0, r1, 0x0) 10:02:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@private0}}, &(0x7f0000000000)=0xe8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x18000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xc, 0xaf2, 0x9, 0xeb5b, 0x1, 0xffffffffffffffff, 0x3ff, [], r0, r1, 0x0, 0x0, 0x4}, 0x40) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1502, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffbd) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x200800, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xc, 0x4, 0x5, 0xffffffffffffffc0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0xa, 0x7, 0x6, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x9, 0x4, 0x5, 0xfffffffffffffff8, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4e701de3d68aaca6, 0x3, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x8000, 0x42, &(0x7f00000000c0)=""/66, 0x41000, 0x14, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x3, 0x20, 0x3fa9}, 0x10, 0x23097, r2}, 0x78) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x68000000}, 0x78) 10:02:28 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x50c01, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xffffffffffffff59) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000ec0)={'gre0\x00', &(0x7f0000000d80)=ANY=[@ANYBLOB="040000000000000000000000e3c6f6b5", @ANYRES32=0x0, @ANYBLOB="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"]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000f00)={@empty, @mcast2, @mcast2, 0x96ec, 0xfff7, 0x4, 0x0, 0x6, 0x800000, r0}) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="c513a2794d5129e124a45d1a345e2067816d47558141929b18599d4ad08870a9c9539fc5c6c02a90f9a5d5d20afd13330e2e8abdfe52e56dfdb6010085e134072c9817e74795b9217c6a91d7a1486d9d45ba07782853fe346e855d17e5aae7e8902cce5323238814f5c2ddac367572db8895309aa33c74db88ef283c9bd87bfcdb3cd25bb093581aaed10cb92f34150dfa84cefcd4f33490c361d0f721bf60b68f4e7be5dacc7ddedb31cdd0e65d358d3c72c6bb7cd474211f70c254a64408480b5552151ea74a19900a77a0c0539c261033c6e4e4c33d19eb9aafe8930a0c2a139f5b7a93822883792c7336b05e27d1807c4ffe5b25c456ce73", 0xfa, 0xfffffffffffffffc) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff, 0x7fffffff], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1503, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @nl=@unspec, @ipx={0x4, 0xffff, 0xf6, "aaffef377209", 0x4}, @qipcrtr={0x2a, 0xffffffff, 0x3fff}, 0xfffc, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)='bond_slave_0\x00', 0x523b, 0x4, 0x4}) 10:02:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) getpeername(r0, 0x0, &(0x7f0000000040)) syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x4802, 0x0) ioctl$SNDCTL_SYNTH_INFO(r1, 0xc08c5102, &(0x7f0000000000)={"0651b2bd6ca9cfcd5c6c18aa83131575c35a563e59f02d4b8b2212941a6a", 0x8, 0x2, 0x0, 0x2, 0x3b, 0x7, 0x4, 0x4, [0x1, 0x1, 0x5e75, 0x7, 0x100, 0x401, 0x6, 0xfffffffd, 0x6, 0x0, 0x6, 0x8, 0x100, 0x0, 0x935, 0xfffffffb, 0x6, 0x1000, 0x1ff]}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002bc0)=[{{&(0x7f0000000180)=@nfc, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)}, {&(0x7f0000001240)=""/104, 0x68}], 0x3, &(0x7f0000001300)=""/191, 0xbf}, 0x426}, {{&(0x7f00000013c0), 0x80, &(0x7f0000002440)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1}, 0x8001}, {{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000002480)=""/97, 0x61}, {&(0x7f0000002500)=""/208, 0xd0}, {&(0x7f0000002600)=""/199, 0xc7}, {&(0x7f0000002700)=""/81, 0x51}, {&(0x7f0000002780)=""/174, 0xae}], 0x5, &(0x7f00000028c0)=""/17, 0x11}, 0x7}, {{&(0x7f0000002900)=@generic, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002980)=""/220, 0xdc}, {&(0x7f0000002a80)=""/139, 0x8b}], 0x2, &(0x7f0000002b80)=""/3, 0x3}, 0x9}], 0x4, 0x10020, &(0x7f0000002cc0)={0x0, 0x3938700}) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6c000000}, 0x78) 10:02:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x24) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 5: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff, 0x7ff], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000000)={"09c98a4a9f45d1156955fff64f6996ebcf6e29bb8ed6867358f9727a6a2f", 0x8001, 0x0, 0x401, 0x0, 0x3f, 0x4, 0x7, 0x5, [0x1ce, 0x40, 0x3, 0x9, 0x0, 0x6, 0x6, 0x3, 0x4, 0x4, 0x4, 0x20, 0xfffffffd, 0x4, 0x746, 0xf6f, 0x6, 0x7, 0x51da]}) ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f00000000c0)) 10:02:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x74000000}, 0x78) 10:02:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:28 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3, 0xff], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:28 executing program 1: ioctl$SNDCTL_SEQ_GETOUTCOUNT(0xffffffffffffffff, 0x80045104, &(0x7f0000000280)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000240081b0f6188734a2cd0f05505fdc31e7f344b69e8ceaa6192c1bcac86b44991b3", @ANYRES16=0x0, @ANYBLOB="200025bd7000fddbdf25030000000c000400ff0300000600000014000100200100"/46], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x8004) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffef6) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00', r0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x48, r3, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008800}, 0x44005) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) 10:02:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x10) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x8c, 0x464, 0x1, 0x70bd2c, 0x25dfdbfc, "28336037dff93557aeea403d8f12343ed95ac969bef453aaee8779a011f4e7df1e99cd0982abe1c700834719bbde79147ed710265a6c0c0fae9fa0c1da0429896c35e7a47c985f77e6d2a0244fb1d9f180c0548164569e53b7021cc824165f830f9277510a1145b18c578e7504693cff5bb54fef91c55bad54d03a08", ["", "", "", "", "", "", ""]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000144}, 0x4000) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62, 0x0, 0x3], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@buf={0xc1, &(0x7f0000000040)="b8081a145137d71df81ad5a9c0917904831264c5d6bcce0252b34b8cd0a4fa937039402a693f7c720a9447c468db7ba5497761cbaf10767b9eedcf2c32122e4dbe1ed035a092c0eb4b7ecfcc8b86fa531fe1b95078e1696ba60d3999f0169cec1dc136a566a91c2db64be9022d804333a1bce57a64e2b38f90297574c937b38f48756228c756f06ee4398f296a9a5dda677d8b4b33217925b18c040bdb2012a1720b1af0d8c77a8de8b28db9ee7403ec95d31e50335620993aaf71fd51a783e53a"}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) socket(0x1f, 0x6, 0x4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000180)={'veth0_to_hsr\x00', @ifru_ivalue}}) 10:02:29 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x260302, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r2, 0x8004510a, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffffffffff4d) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x76010000}, 0x78) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 2: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1507, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000080)=0x80) r0 = socket$inet6(0xa, 0x5, 0x7fff) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@remote, 0x11}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffffffffffdd) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7a000000}, 0x78) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6, 0x62], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1508, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) bind$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, 0x10) 10:02:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffd7) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x93000000}, 0x78) 10:02:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffffff2d) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 2: ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffcb9) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f, 0x6], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:29 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \a\x00\x00', @ANYRES16=r0, @ANYBLOB="100028bd7000fedbdf25060000000c0010000900000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x3f12a1b78714aab6}, 0xc000880) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffefa) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x98030000}, 0x78) 10:02:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040)='802.15.4 MAC\x00', 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x2, 0x70bd2c, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008010) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0)='802.15.4 MAC\x00', r0) r2 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={@private0, @dev={0xfe, 0x80, [], 0x35}, @private0={0xfc, 0x0, [], 0x1}, 0x9, 0x2, 0x1000, 0x500, 0x800, 0x800009}) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6, 0xffffff7f], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfffffffffffffdd4) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x150a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000880), &(0x7f00000008c0)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x2a}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @jmp={0x5, 0x0, 0x3, 0x7, 0x0, 0x6, 0x4}, @generic={0x56, 0x1, 0x3, 0x5, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0xbd, &(0x7f0000000080)=""/189, 0x41100, 0x7, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x0, 0x8, 0x4}, 0x10}, 0x78) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xff000000}, 0x78) [ 2131.489595][T14385] ================================================================== [ 2131.497700][T14385] BUG: KCSAN: data-race in netlink_insert / netlink_sendmsg [ 2131.504981][T14385] [ 2131.507297][T14385] write to 0xffff88812bc87b40 of 1 bytes by task 14382 on cpu 0: [ 2131.515004][T14385] netlink_insert+0x636/0x8e0 [ 2131.519686][T14385] netlink_autobind+0xae/0x160 [ 2131.524448][T14385] netlink_sendmsg+0x47c/0x7c0 [ 2131.529210][T14385] ____sys_sendmsg+0x360/0x4d0 [ 2131.533978][T14385] __sys_sendmsg+0x1ed/0x270 [ 2131.538565][T14385] __x64_sys_sendmsg+0x42/0x50 [ 2131.543327][T14385] do_syscall_64+0x39/0x80 [ 2131.547739][T14385] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2131.553643][T14385] [ 2131.555981][T14385] read to 0xffff88812bc87b40 of 1 bytes by task 14385 on cpu 1: [ 2131.563625][T14385] netlink_sendmsg+0x26c/0x7c0 [ 2131.568392][T14385] __sys_sendto+0x2a8/0x370 [ 2131.572895][T14385] __x64_sys_sendto+0x74/0x90 [ 2131.577572][T14385] do_syscall_64+0x39/0x80 [ 2131.581987][T14385] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2131.587906][T14385] 10:02:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) syz_io_uring_setup(0x5f1a, &(0x7f0000000000)={0x0, 0xc6fd, 0x4, 0x3, 0x1f9}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x3474, &(0x7f0000000100)={0x0, 0x6b18, 0x4, 0x1, 0x115}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000500)=@IORING_OP_WRITEV={0x2, 0x2, 0x0, @fd_index=0x1, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000200)="9784ba330198c2cfc3e985456379a36d4bfecce637d4c67750b0e380427f547b7bdad663f846103659f623e08dd2733b23d98a97393e7abe261b972e5e30d224a6c49c0a4804187ca2e7772dcda4d300f3", 0x51}, {&(0x7f0000000280)="02147d35b27ecad80b7794ac0d0edec731c2fb4b0c687ccf9c03f31ad1c522aabf1722a5e9f480e3b2f475955565ca4201d1e5b04a46081749799490fb23194a80c13cbde9be3a41a02a04245f653eb0a3622a79195204eca04585bf6b440e76221d5e1da05a5471e3636cc03b72976eb8bf288436eb6b980cda6ef9b1596b6804b7184be83955d36c385e2576ac95828a1604c1ff9ae399e7cb62723f3014a6f60031c13b45e4e0c15a8d1444dbede56de6a7e11b9781ab3ca6990e48ca691293aee47ac78897330682d3250fd5bdb886eb03af99", 0xd5}, {&(0x7f0000000380)="d84b2a958731636484a94c08f28f2c438b954a0d3a4594f94ffc96ffddc1f080fd02c3058fa6566c6f5e682680480eab9cd81e65406c0422dfaed6055070fb2a447f602d1bd2f376d273cc178ab2610d75a24639bd4ed6d47fb92605fb8ba0db6d336c1830c497f707e57e53823705ed614095849c0036b39208eb3b7de017c32d6f99eea2793a12eebf581a20fc4d5fac29f7ddcedf56d0b4291c4ed4dae44360536a8d280b7b21b734d18bfae66b809d92945632b31512df1a0cc00015d14840def623f8996254", 0xc8}, {&(0x7f0000000480)="257ea9ec11ffa8ccd7e8f9662fab283520f7aaf407ba4aa01966609951f91779a6f26e0f4dfc5c4f1b4b5dd581152c2a", 0x30}], 0x4, 0x13}, 0x2c5) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nvram\x00', 0xd00, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x100000a, 0x20010, r2, 0x0) r3 = syz_io_uring_complete(r0) ioctl$sock_ifreq(r3, 0x894a, &(0x7f0000000580)={'sit0\x00', @ifru_flags}) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x25) 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x20003db8) 10:02:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) recvmsg$can_j1939(r0, &(0x7f00000010c0)={&(0x7f0000000000)=@isdn, 0x80, &(0x7f0000001080)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1}, 0x2083) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x150b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e, 0x6], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) [ 2131.590220][T14385] Reported by Kernel Concurrency Sanitizer on: [ 2131.596354][T14385] CPU: 1 PID: 14385 Comm: syz-executor.2 Not tainted 5.12.0-rc2-syzkaller #0 [ 2131.605112][T14385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2131.615187][T14385] ================================================================== 10:02:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1={0xfc, 0x1, [], 0x1}, @in=@broadcast, 0x4e24, 0x3c, 0x4e22, 0x81, 0x2, 0x20, 0xa0, 0x29, 0x0, 0xee01}, {0x4, 0x3, 0x313, 0x2, 0x7, 0x3b58, 0x8, 0x2}, {0x4, 0x5, 0x400, 0x7}, 0x64f8, 0x6e6bb1, 0x2, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4d3, 0x32}, 0x2, @in=@loopback, 0x3500, 0x3, 0x1, 0x1f, 0x2, 0x729, 0x400}}, 0xe8) 10:02:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x3b) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x20000000) 10:02:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000000)={"fae09ddee19e4dba91f7118458e839475e5fa38c0bfd1aa1382a87a4a74a", 0x7, 0x0, 0x401, 0x7, 0x80000001, 0xdfa9, 0x80000001, 0x0, [0x6a9, 0x9, 0x0, 0x2, 0x5, 0x8, 0x80, 0x1, 0x0, 0x10001, 0xf8, 0x1, 0x1, 0x0, 0xfffffffd, 0x7, 0x5, 0xae, 0x7]}) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000, 0x786e], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:29 executing program 1: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0xffffffff, @ipv4={[], [], @empty}, 0x4af7}, {0xa, 0x4e20, 0x1, @remote, 0x2}, 0x3, [0x1, 0x6, 0x72, 0x68, 0x4, 0x8, 0x1ff, 0x4000000]}, 0x5c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'geneve0\x00', @ifru_settings={0x0, 0x0, @fr=&(0x7f0000000080)={0x0, 0x2, 0x1f, 0x2, 0x9a, 0x401, 0x3}}}}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x100) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x150c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3fa, 0x4, 0x70bd26, 0x25dfdbff, {0x1, 0x1, 0x0, 0x1}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000045}, 0x0) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:29 executing program 3: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000c00)=0x0, &(0x7f0000000c40)=0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x5, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], r0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, &(0x7f00000002c0)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=""/244, 0xf4}, 0x40000020) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) 10:02:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5, 0x80000000], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:29 executing program 2: ioctl$SNDCTL_FM_LOAD_INSTR(0xffffffffffffffff, 0x40285107) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x800) sendto$inet6(r0, &(0x7f0000000040)="248bb24cbe5d2e5d83881a2278be3361110debdac99f04fef2066ef0b372af300e498372962f8860635f53c2e2a61d7b56d4694d429e15f9990fb6ad2a6bc61ab094ab6d4782ca97c5aec5d5c47194b6bed7f3d322386e0763dc859168dcfff4b39eee408ea8d0532345f68a0ce28d6ee24c4a08dfe8857d7388da", 0x7b, 0x4000, &(0x7f00000000c0)={0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6}, 0x1c) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_raw(r0, &(0x7f0000000480)={&(0x7f00000002c0)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/117, 0x75}], 0x1}, 0x40000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket(0x6, 0xa, 0x3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0xfffffffa, @private1, 0x331}, {0xa, 0x4e21, 0xfff, @empty, 0x5}, 0x20, [0x6902, 0x7fff, 0x1, 0x6, 0x0, 0x6, 0x7fffffff, 0x3]}, 0x5c) recvmsg$can_j1939(r2, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x9, @private0={0xfc, 0x0, [], 0x1}, 0xfff}, {0xa, 0x4e21, 0x91, @remote, 0x3b}, 0x1000, [0x2, 0x0, 0x4, 0x5, 0x1000, 0x0, 0xff]}, 0x5c) sendmsg$can_raw(r1, &(0x7f0000000280)={&(0x7f0000000180), 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{0x3, 0x0, 0x1}, 0x33, 0x0, 0x0, 0x0, "86afa64209cefae739fc123ef4b2ba34fef118f27d0c0e654b9946f11fd5f1804eeb62ba888e22e2b38e5c3ff2286468bd117af3c9858ca51eb125b7b7484ebc"}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) 10:02:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000016c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001640)=[{{&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/108, 0x6c}, {&(0x7f0000000380)=""/147, 0x93}, {&(0x7f0000000440)=""/113, 0x71}], 0x3}, 0xfffffffc}, {{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/66, 0x42}], 0x2}, 0xfffffffc}], 0x2, 0x40000020, &(0x7f0000001700)={r2, r3+60000000}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xc, 0x1}, @alu={0x4, 0x1, 0xc, 0x3}, @jmp={0x5, 0x1, 0x7, 0x6, 0x4, 0x50, 0x10}], &(0x7f0000000040)='GPL\x00', 0x800, 0xf2, &(0x7f0000000080)=""/242, 0x40f00, 0xd, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x7, 0x84bb}, 0x10}, 0x78) 10:02:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8, 0x5], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0xfa}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @map_val={0x18, 0x4, 0x2, 0x0, 0x1}, @alu={0x7, 0x1, 0x3, 0xb, 0x7, 0x8, 0xfffffffffffffffc}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @alu={0x7, 0x1, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000080)='syzkaller\x00', 0xfffff800, 0xc, &(0x7f00000000c0)=""/12, 0x41100, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xe, 0x6, 0x8}, 0x10, 0x2892d}, 0x78) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880)={0x0, r2}, 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0xc300, 0x0) recvmmsg(r2, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/45, 0x2d}], 0x1, &(0x7f0000000580)=""/200, 0xc8}}, {{&(0x7f0000000680)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000700)=""/194, 0xc2}, {&(0x7f0000000800)=""/54, 0x36}, {&(0x7f0000000840)=""/43, 0x2b}, {&(0x7f0000000880)}, {&(0x7f00000008c0)=""/244, 0xf4}, {&(0x7f00000009c0)=""/94, 0x5e}, {&(0x7f0000000a40)=""/183, 0xb7}], 0x7, &(0x7f0000000b80)=""/240, 0xf0}, 0x7}, {{&(0x7f0000000c80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000d00)=""/112, 0x70}, {&(0x7f0000000d80)=""/168, 0xa8}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/255, 0xff}], 0x4, &(0x7f0000001f80)=""/188, 0xbc}, 0x39a}, {{&(0x7f0000002040)=@hci, 0x80, &(0x7f00000023c0)=[{&(0x7f00000020c0)=""/31, 0x1f}, {&(0x7f0000002100)=""/170, 0xaa}, {&(0x7f00000021c0)=""/161, 0xa1}, {&(0x7f0000002280)=""/73, 0x49}, {&(0x7f0000002300)=""/78, 0x4e}, {&(0x7f0000002380)=""/3, 0x3}], 0x6, &(0x7f0000002440)=""/36, 0x24}}], 0x4, 0x100, &(0x7f0000002580)={0x77359400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xf, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffff881f}, [@ldst={0x2, 0x0, 0x2, 0x7, 0x1, 0xfffffffffffffff8, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0xb, 0x3, 0xfffffffffffffff0, 0xf}, @alu={0x4, 0x1, 0x3, 0x1, 0x1, 0x8, 0xfffffffffffffff0}, @map={0x18, 0x3, 0x1, 0x0, 0x1}, @alu={0x7, 0x1, 0x0, 0x6, 0x9, 0x6, 0x10}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffeff}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000002c0)='GPL\x00', 0x1f, 0x81, &(0x7f0000000300)=""/129, 0x40f00, 0x1, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000400)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x6, 0x1}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000200)={0x0, r1}, 0x10) 10:02:30 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101900, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x4) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = socket(0xa, 0x4, 0x5) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000200)=0x1) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000000c0)={@mcast1, r1}, 0x14) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=0x39) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x14, 0x1, &(0x7f00000000c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfffffffffffffe7b) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x7, 0x7800, 0x0, 0x7fff, {{0xb, 0x4, 0x2, 0x2, 0x2c, 0x64, 0x0, 0x48, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, {[@rr={0x7, 0x7, 0x53, [@empty]}, @generic={0x94, 0xc, "08ef0d300ef0f48facd7"}, @timestamp_addr={0x44, 0x4, 0x2f}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x7, 0x1, 0x1, 0x4, [], 0x0, r0, 0x0, 0x3, 0x1}, 0x40) 10:02:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001d80)={'ip_vti0\x00', &(0x7f0000001c80)={'tunl0\x00', 0x0, 0xf, 0x1, 0x1, 0xfff, {{0x2c, 0x4, 0x3, 0x4, 0xb0, 0x65, 0x0, 0xe0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@ssrr={0x89, 0xf, 0xd5, [@private=0xa010100, @private=0xa010101, @multicast1]}, @generic={0x86, 0x12, "b8bf0a5f150be873c36e69cb9b676888"}, @rr={0x7, 0x13, 0x9e, [@dev={0xac, 0x14, 0x14, 0x21}, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @remote]}, @rr={0x7, 0x13, 0xbf, [@broadcast, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101]}, @timestamp_addr={0x44, 0x34, 0x6b, 0x1, 0x9, [{@loopback, 0x8}, {@multicast2, 0x4}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@rand_addr=0x64010101, 0x7}, {@local, 0x9}]}, @timestamp_addr={0x44, 0x1c, 0x7c, 0x1, 0xf, [{@remote, 0x90}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x3ff}, {@loopback, 0x400}]}, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001dc0)={0x10, 0x5, 0x5, 0x0, 0x404, 0xffffffffffffffff, 0x2, [], r0, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x40) 10:02:30 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@raw=[@exit, @generic={0x4, 0x8, 0x9, 0x6d, 0x1000}, @generic={0xff, 0x1, 0x8, 0x8001, 0x2}], &(0x7f0000000040)='GPL\x00', 0x2, 0x6f, &(0x7f0000000080)=""/111, 0x41100, 0x6, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0xfffffff8, 0x7fff}, 0x10, 0x2dd3e, r0}, 0x78) 10:02:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@private2}, 0x14) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000, 0x8], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in=@remote, 0x4e23, 0x0, 0x4e24, 0x0, 0xa, 0x0, 0xe0, 0x84, 0x0, 0xee00}, {0x7, 0x2, 0x7, 0xfc, 0xfff, 0x637c, 0xffffffffffffff00, 0x6}, {0x20, 0x2, 0x81, 0x247}, 0x3ff, 0x6e6bb0, 0x2, 0x1, 0x2}, {{@in=@loopback, 0x4d4, 0xff}, 0xa, @in=@multicast1, 0x1, 0x1, 0xab986ca372c79d1, 0x6, 0xfffffffd, 0x400, 0x1}}, 0xe8) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1603, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x93) 10:02:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffde9) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b, 0x4000000], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1604, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2ba183, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000000c0)={0x0, 0x74, 0x3, 0xffffffff, 0x2000000, 0x7, 0x3, 0x3ff, 0x204056, 0xff, 0x2, 0xfffffff7}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f00000001c0)={0x1}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e22, 0xf40, @loopback, 0xfffffff8}, {0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x4ab, [0x6eb4, 0x0, 0x0, 0x6, 0x0, 0x9, 0x3f, 0x6]}, 0x5c) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r4, 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r4, 0x80045113, &(0x7f0000000200)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r5, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 10:02:30 executing program 1: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000000)=@pppoe, 0x80, &(0x7f0000001300)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)=""/43, 0x2b}, {&(0x7f0000000100)=""/158, 0x9e}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/23, 0x17}], 0x6, &(0x7f0000001380)=""/248, 0xf8}, 0x40000101) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000014c0)={{0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3}, {0xa, 0x4e23, 0x8, @private1, 0xf2}, 0xfe01, [0x1, 0xfffffffc, 0x4, 0x451c, 0x7, 0x7f, 0x7f, 0x5]}, 0x5c) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000000c0)={0xc, 0x3f, [], [@jumbo, @enc_lim={0x4, 0x1, 0xf6}, @generic={0xf6, 0x1000, "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"}]}, 0x1018) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x9a)\x00', 0xfffffffffffffffc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2, 0x1b], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0050f19f040000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fedbdf25020000000800040001010000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x12022) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@remote, @in=@multicast2, 0x4e21, 0x8, 0x4e21, 0x1, 0xa, 0x20, 0x80, 0x2f}, {0x9, 0xfff, 0x9, 0x4, 0xa3ca, 0xffffffffffffff45, 0xfffffffffffffffa, 0x2}, {0x3, 0xfff, 0x2, 0x3}, 0x5, 0x0, 0x3, 0x1, 0x1, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x2c}, 0x4d5, 0x3c}, 0x12, @in6=@rand_addr=' \x01\x00', 0x3503, 0x1, 0x3, 0x93, 0x5, 0x1, 0x1}}, 0xe8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000004680)={&(0x7f00000045c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000004640)={&(0x7f00000046c0)=ANY=[@ANYBLOB="3592eecd565062fab33ab885c45d2d7e3fa04c0139096ced907345ff1f5f93a2c866d03d802722d1b69edefce162400d7dd8bf56aa522160088869ff1d5c8ed2150dcd52ce5b4f8ff873fc7e4c077fab084d189a643755a80591bbd7bec0f6c8ffc886c687fd7c54209ec9d14d6301dbbfceb0c590f425739523a883b593af41b62c3bf922bfdc671028709efffb185f2f1c02fd0ed060ed344b6161f7d6e792d957b7948cc702a9", @ANYRES16=0x0, @ANYBLOB="040026bd7000fbdbdf25020000000800030000000000"], 0x1c}}, 0x1) recvmsg$can_j1939(r1, &(0x7f0000004580)={0x0, 0x0, &(0x7f0000004440)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/169, 0xa9}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/134, 0x86}, {&(0x7f0000003440)=""/4096, 0x1000}], 0x6, &(0x7f00000044c0)=""/157, 0x9d}, 0x61) getcwd(&(0x7f0000000100)=""/91, 0x5b) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x2, 0x1, 0x1, 0x0, 0xa, 0xfffffffffffffff4, 0xffffffffffffffff}, @ldst={0x0, 0x3, 0x6, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xc0, &(0x7f0000000100)=""/192, 0x41000, 0xc, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x8, 0x7ff}, 0x10}, 0x78) 10:02:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x67) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x2], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x880, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10080, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0xffff, 0x9e54, 0xfff, 0x2c, r0, 0x7fff, [], 0x0, r1, 0x1, 0x4, 0x2}, 0x40) 10:02:30 executing program 3: ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000000)={"a9d47babd7998fdeccd9dcbc4ca2e814f9b12625c3f26d5c0c8bcb96b5f1", 0x800, 0x2, 0x0, 0x1, 0xff, 0x7fffffff, 0x80000000, 0x5, [0x40, 0x5155, 0x8, 0x370e, 0x10001, 0x2c75, 0x400, 0xb6, 0x7, 0x0, 0x1, 0x5, 0x69be, 0x3, 0x6, 0x4, 0x8, 0x1, 0xe628]}) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045113, &(0x7f00000000c0)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1606, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x57e3587dd0ea4e02, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:30 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffff3) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x1d8, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@rand_addr=' \x01\x00', 'bridge_slave_0\x00', {0x80000001}}}}, {{@ipv6={@ipv4={[], [], @rand_addr=0x64010100}, @remote, [0xffffff00, 0xffffff00, 0xffffff00, 0x1ff0001ff], [0xff, 0x0, 0xff, 0xff], 'geneve1\x00', 'veth1\x00', {0xff}, {}, 0x0, 0x20, 0x1, 0x20}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xff, 0x1, "9b19208338ea94f3cdc4df43c522910aebbb08e26e522b2dfec08f8e3731"}}}, {{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x42}, [0xffffffff, 0xffffff00, 0xffffff00], [0xff000000, 0x0, 0x0, 0xffffffff], 'wg2\x00', 'bond_slave_1\x00', {}, {}, 0x5e, 0x3f, 0x1, 0x14}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0xf427aebf751be339, 0x0, 0x1}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0xffffffff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440)='/dev/bsg\x00', 0x80000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) getsockname$l2tp(r2, &(0x7f0000000840)={0x2, 0x0, @private}, &(0x7f0000000880)=0x10) r3 = pidfd_getfd(r1, r0, 0x0) pidfd_send_signal(r3, 0x1, &(0x7f0000000940)={0x13, 0x9, 0x7}, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f0000000540)) openat$bsg(0xffffffffffffff9c, &(0x7f0000004500)='/dev/bsg\x00', 0x1935c0, 0x0) getpeername(r1, &(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000500)=0x80) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000900)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r2, &(0x7f00000008c0), 0x0, 0x0, 0x800}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000640)={'erspan0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="800000070000000800005a8c408a004000660006072f9078ac14147aaaac1414aa44049ca0441c3643ac1e0100140200ffffffff00000001ac1414bb80000001070bb364010100ac14142600"]}) getpeername(r1, &(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f0000000800)=0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)={&(0x7f0000000600)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip_vti0\x00', r4, 0x20, 0x8, 0x4, 0xfffffffd, {{0x15, 0x4, 0x1, 0x5, 0x54, 0x68, 0x0, 0xe0, 0x2f, 0x0, @local, @private=0xa010100, {[@noop, @timestamp_addr={0x44, 0x24, 0x7f, 0x1, 0x3, [{@multicast1, 0x9}, {@multicast1, 0xfff}, {@local, 0x5c2}, {@remote}]}, @timestamp_addr={0x44, 0x14, 0xdc, 0x1, 0x2, [{@multicast1, 0x7fffffff}, {@private=0xa010100, 0x4}]}, @rr={0x7, 0x7, 0xd6, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x444, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0x23, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00', '$&]:}!^%-[)\x00']}, [""]}, 0x444}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x3}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0xff}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40010}, 0x1) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1607, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0xf4595afd6f2ed4e9, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000002c0)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x2, 0xa, 0x401) recvmsg$can_j1939(r1, 0x0, 0x0) recvmsg$can_j1939(r1, 0x0, 0x40000140) recvmsg$can_j1939(r0, &(0x7f0000000200)={&(0x7f0000000000)=@caif=@rfm, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/160, 0xa0}], 0x1, &(0x7f0000000180)=""/116, 0x74}, 0x0) 10:02:30 executing program 1: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c885}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf={0x1000, &(0x7f0000000440)="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"}) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffed6) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@raw=[@generic={0x9, 0x8, 0x0, 0x3, 0x2908}, @generic={0x50, 0x0, 0x0, 0x1, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x101}, @exit, @alu={0x4, 0x1, 0xb, 0x2, 0xa, 0x6, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x12}], &(0x7f0000000040)='GPL\x00', 0xff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x1, 0xb, 0xffff4c77, 0xdad3}, 0x10}, 0x78) 10:02:30 executing program 5: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045113, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x438, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0x17, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00', ']@\\$\x00']}, [""]}, 0x438}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x26, 0x89, &(0x7f0000000380)=""/137, 0x0, 0xf, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_data=&(0x7f0000000000)="6753e84d981aa1fdf09059122d4f18b0ba44eb0194c310626ec59b2ad6414977"}}) 10:02:30 executing program 1: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x1c0000005}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xffffffffffffff36) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000000c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 10:02:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffd40) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1dd}, [@exit, @alu={0x4, 0x0, 0xa, 0x9, 0x6, 0xffffffffffffffc0, 0x8}, @jmp={0x5, 0x1, 0x7, 0x8, 0xb, 0x0, 0xfffffffffffffffc}, @exit, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @ldst={0x2, 0x0, 0x1, 0x3, 0x6, 0xfffffffffffffffc, 0x8}, @ldst={0x1, 0x2, 0x2, 0x1, 0xb, 0xffffffffffffffc0, 0xfffffffffffffff8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x47, &(0x7f00000000c0)=""/71, 0x40f00, 0x47a921e443a3bf99, [], r0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xb, 0x7fff, 0x7fffffff}, 0x10}, 0x78) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="949a26dffe704979ebfc3a327163374b2da827406bf7c3cf5bb96653ef67d2fde131824705738b4f3cb87c05a6088588852a08005ee7c5823a1310edc774b9d25b488b96b0c116e27467770455c3166c0a1b6bad5f20c0ed3638dd69fbbeb36a69386752a7c938"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) 10:02:30 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) clock_gettime(0x0, &(0x7f00000016c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001680)=[{{&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000001540)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/214, 0xd6}, {&(0x7f0000001180)=""/87, 0x57}, {&(0x7f0000001200)}, {&(0x7f0000001240)=""/74, 0x4a}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/83, 0x53}, {&(0x7f0000001380)=""/137, 0x89}, {&(0x7f0000001440)=""/240, 0xf0}], 0x9, &(0x7f0000001600)=""/86, 0x56}, 0x8}], 0x1, 0x40012142, &(0x7f0000001700)={r1, r2+60000000}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) syz_io_uring_complete(0x0) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1609, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x434, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0x12, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00', '%[#\x00']}, [""]}, 0x434}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 3: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000100)) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd700015dc76657468315f746f5f626174616476000c001600e2b80000000000000500220000000000050022000000000006001b004e240000"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x6, 0xfffffffffffffdd4, &(0x7f0000000380)=""/134, 0x0, 0xb, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000500)=0x4) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1f, 0x1ff, 0x0, 0x4, 0x3, 0x0, "adb6cb2cb220d5b917c723f0ef94c55f708cdff3ffb61b6c45743485739a31a380c7a0402f30af242926d9c2b59d6265d8467ba2f112816a39a6ead3cf45c51f", "eb81394ef972fb5e979375feb8121969eaae7a69a7bc969ed38f5039c297279030dc993d9f5092bd3cdde6b8a34bca2f480ba74b86c3b03ae61372a6a140e802", "a97c1a7ab5339a27102dea3b4d752849f01d79d8ad8f895332b392e7221ffd3a", [0x100000001, 0x5]}) 10:02:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xa4202cfe56dd94a) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x34080, 0x0) recvmsg$can_j1939(r2, 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$SNDCTL_TMR_SELECT(r1, 0x40045408) 10:02:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x160a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x430, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0xe, ['*#\x00', '\x00', '[$}/@\x00', '0/:\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvram\x00', 0x400, 0x0) r3 = pidfd_getfd(r1, r0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f00000016c0), &(0x7f0000001700)=0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x348, 0x190, 0xffffffff, 0xffffffff, 0x190, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00', [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xffffffff], 'veth1_to_hsr\x00', 'gre0\x00', {0xff}, {0xff}, 0x5e, 0x6b, 0x7, 0x18}, 0x0, 0x128, 0x190, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'rose0\x00', {0x4, 0x0, 0x1, 0x80000001, 0xfffffffc, 0x6, 0x3, 0x80, 0x18}, {0x8}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x2, 0x101, 0xffff, 0x3, '\x00', 'syz0\x00', {0xdc}}}}, {{@ipv6={@empty, @ipv4={[], [], @multicast2}, [0xff000000, 0xff000000, 0xff], [0x0, 0x0, 0x3073683eb9919eaa, 0xffffffff], 'wlan1\x00', 'bridge_slave_1\x00', {0xff}, {0xff}, 0x87, 0x2, 0x5, 0x15}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x18, "b4c724d0576d4625affcdd64491fd66a19c062af73f9809052bdb7331e40"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) 10:02:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="341d4a62b660089ca429ad8eb9e985eeaa32bb451dc80e9d669e9f3d152c8bc511e26f28d07d409a3c77840cb49041360c1607044c1876918068134fc7294aaa9f097be0493b2e0d07b9d36fb36003ddd2f8c621621440ec95b04e74b9ef45c4a9"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2132.910743][T30752] usb 2-1: new high-speed USB device number 71 using dummy_hcd [ 2133.430712][T30752] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 2133.439830][T30752] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2133.448196][T30752] usb 2-1: Product: syz [ 2133.452428][T30752] usb 2-1: Manufacturer: syz [ 2133.457055][T30752] usb 2-1: SerialNumber: syz [ 2133.501063][T30752] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 2134.070734][T30752] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 2134.274032][T14545] udc-core: couldn't find an available UDC or it's busy [ 2134.284160][T14545] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2134.292523][ T8564] usb 2-1: USB disconnect, device number 71 10:02:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045113, &(0x7f0000000000)) 10:02:32 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x160b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x5, 0x2) getsockname(r2, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) recvmsg$can_j1939(r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl0\x00', r3, 0x0, 0x7800, 0x3, 0x7, {{0x33, 0x4, 0x1, 0x2, 0xcc, 0x68, 0x0, 0x4, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4, 0x1}, @generic={0x88, 0x12, "79094efa0343d9ff16c4adfe19e71913"}, @timestamp={0x44, 0x28, 0x69, 0x0, 0x7, [0xffffffff, 0x9, 0x8001, 0x2, 0x80, 0x2, 0x6, 0x8, 0x0]}, @lsrr={0x83, 0x23, 0xd0, [@local, @loopback, @remote, @broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @dev={0xac, 0x14, 0x14, 0x30}, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2]}, @generic={0x7, 0x3, "04"}, @generic={0x89, 0x8, "e7dbc00a0f4d"}, @ssrr={0x89, 0x17, 0xdf, [@multicast2, @loopback, @empty, @local, @loopback]}, @cipso={0x86, 0x32, 0x0, [{0x6, 0xd, "d15e3dec5607b36d7229af"}, {0x6, 0x12, "07ad82a3e8a004d6c94f09000000aa84"}, {0x5, 0xd, "ae54fa2729dea81fc7af54"}]}]}}}}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@mcast1, @mcast2, @rand_addr=' \x01\x00', 0x4, 0x2, 0x8, 0x500, 0x1, 0x289009a, r4}) 10:02:32 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x42c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0xa, ['*#\x00', '\x00', '[$}/@\x00']}, [""]}, 0x42c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b40)='802.15.4 MAC\x00', r0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="b2e60dc44630bdd1546f5a2d289071a96ac6161dc65dbb3600c1c0e4593c0e9c45bbd0cdb8f6edff1abde6811790633a632a735b0ea54fba77112acd6fe66bbf1b32b48708867314af710832a8cd68320fb29eb73e8c8182a6ef3216", 0x5c, 0x9, &(0x7f0000000200)={0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00', 0x7ff}, 0x1c) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x210, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x404c041) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140)='802.15.4 MAC\x00', r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) pidfd_getfd(r1, r1, 0x0) 10:02:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x41100, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2134.801612][T14585] udc-core: couldn't find an available UDC or it's busy [ 2134.808657][T14585] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 10:02:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x30) r0 = socket(0x14, 0x4, 0x4) getsockname(r0, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) 10:02:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:32 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x424, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0x4, ['*#\x00', '\x00']}, [""]}, 0x424}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:32 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x160c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x407ca431eed81a72) 10:02:33 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x424, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0x3, ['*#\x00']}, [""]}, 0x424}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x2042) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x80010, r0, 0x0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@private0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@private2}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@private2={0xfc, 0x2, [], 0x1}, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x5e25, 0x800, 0x1, 0x500, 0x2, 0x40040, r1}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000080)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x4e24, 0xb2a, 0xa, 0x0, 0x0, 0x3b, r1, r2}, {0xf5f6, 0x82, 0xf125, 0x7fffffff, 0x8030, 0xac, 0x6, 0x72a0f56b}, {0x9, 0x1c, 0x800, 0x3}, 0xfffffffc, 0x6e6bbb, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d2, 0x33}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3500, 0x0, 0x1, 0x5c, 0x2, 0x7a, 0x849}}, 0xe8) 10:02:33 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x200001, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="949737937efe3e807a19e9e7d4c7ecb19fd49cc96f46edf02592539e43ee8a69c3878e580d93ce7fef4bf1a040747cf71cc5bc96029c1af2f49d50577bd620b393016426b276c35df22d59f7ee4c6ac7a6a741a1f436a5046f86f8532233eb351715f6c926c72a5f8e1b7ccba5ccd8a33b9de55cb9896b"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000080)=""/148, 0x41100, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfb05ed165bfb1729) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000040), 0x4) 10:02:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001700)={0x0, @ipx={0x4, 0xfff8, 0x4, "8ee3905afcb9", 0x9}, @phonet={0x23, 0x1, 0x3, 0x1}, @ethernet={0x1, @random="fe9ff57bf461"}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f00000016c0)='ipvlan0\x00', 0xffffffffffff0001, 0x3, 0xa}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202400, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x258502, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x420, 0x3f3, 0x0, 0x0, 0x0, {}, [""]}, 0x420}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1701, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffe9b) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x110, &(0x7f0000000000)=0x2, 0x0, 0x4) syz_io_uring_complete(0x0) 10:02:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000080)=0x8) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4}) 10:02:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x4, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1f}, @call, @generic={0x1, 0x8, 0xf, 0x5, 0x3ff}], &(0x7f0000000040)='GPL\x00', 0x1, 0x4a, &(0x7f0000000080)=""/74, 0x40f00, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x2, 0x8, 0x1}, 0x10}, 0x78) 10:02:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001440)={'tunl0\x00', &(0x7f00000002c0)={'erspan0\x00', 0x0, 0xbce5e2225184df97, 0x7, 0x4, 0x3, {{0xa, 0x4, 0x0, 0x5, 0x28, 0x65, 0x0, 0x48, 0x4, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x14, 0x3a, 0x1, 0x7, [{@rand_addr=0x64010100, 0x4}, {@private=0xa010101, 0x8}]}]}}}}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001480)={{{@in=@local, @in6=@mcast2, 0x4e22, 0xfff, 0x4e23, 0x0, 0xa, 0x80, 0x80, 0x32, r1}, {0x100000001, 0xfffffffffffff801, 0x2, 0x7fffffff, 0x1, 0x6, 0x100, 0x10001}, {0x4, 0x0, 0x1, 0x43}, 0x7, 0x0, 0x1, 0x0, 0x3, 0x3}, {{@in=@multicast1, 0x4d3, 0x32}, 0x8, @in=@multicast1, 0x3504, 0x3, 0x3, 0xa2, 0xfcd, 0x77d, 0x6}}, 0xe8) 10:02:33 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x420}, 0x420}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) [ 2135.134754][T30752] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 2135.146495][T30752] ath9k_htc: Failed to initialize the device [ 2135.162906][ T8564] usb 2-1: ath9k_htc: USB layer deinitialized 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1702, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 2: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000180)="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", 0x125, 0xfffffffffffffff8) ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045113, &(0x7f0000000080)) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r1, &(0x7f0000000640)=""/71, 0x47) keyctl$negate(0xd, r0, 0x4, r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:33 executing program 5: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e24, 0x6, @private1={0xfc, 0x1, [], 0x1}}, {0xa, 0x4e23, 0x4, @ipv4={[], [], @local}, 0xffffffff}, 0xcff, [0xfffffffc, 0x3f, 0x5, 0x8, 0x46, 0x40, 0x1, 0x80000000]}, 0x5c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000003b00)=0x0, &(0x7f0000003b40)=0x4) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000003400)={'syztnl2\x00', &(0x7f0000003380)={'syztnl2\x00', r0, 0x10, 0x700, 0x3, 0x5, {{0x12, 0x4, 0x3, 0x24, 0x48, 0x66, 0x0, 0x3, 0x2f, 0x0, @broadcast, @remote, {[@lsrr={0x83, 0x27, 0x31, [@remote, @broadcast, @multicast2, @broadcast, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @private=0xa010102, @private=0xa010100]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x7, 0x81, [@remote]}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000034c0)={0x18, 0x7, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xa, 0x1, 0x0, 0x8, 0xffffffffffffffff}, @map_val={0x18, 0x822836b6373f2344, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xa834}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003440)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000003480)={0x2, 0xf, 0x7ff, 0xdbf6}, 0x10}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000003b80)={0x2, 0x1, 0x1, 0x9, 0x0, 0x1, 0x2, [], r0, r3, 0x4, 0x5, 0x4}, 0x40) 10:02:33 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) socket$inet6(0xa, 0x80000, 0xfffffffe) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffe76) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) 10:02:33 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x420}, 0x420}}, 0x8) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000001880)=0x0, &(0x7f00000018c0)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x11, 0x5, &(0x7f0000000000)=@raw=[@alu={0x7, 0x0, 0x5, 0x8, 0xa, 0x0, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3ff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x74, &(0x7f0000000100)=""/116, 0x40f00, 0xc, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001900)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001940)={0x2, 0x1, 0x2, 0x2}, 0x10}, 0x78) 10:02:33 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x10000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) 10:02:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffffffffffffffc0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x7, 0x5, 0x0, 0x40, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x40) r2 = syz_io_uring_complete(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1d, 0x6, 0x8001, 0x7fff, 0x120, r1, 0x7, [], 0x0, r2, 0x5, 0x2, 0x3}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x81, 0x3, 0x6, 0x161, r0, 0xfff, [], 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x40) 10:02:33 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x420}, 0x420}}, 0x0) 10:02:33 executing program 1: sendto$l2tp(0xffffffffffffffff, &(0x7f00000000c0)="5492bf9ebb675aa737a3c0069d23e35a385b96c9806ac29f414d61c9a1d034ebe46d9d0264e5795ada7885234628c0594356868a26b02495f3a51ec459ff20efb5adcb9ec0a35ef6810be9a473a956f70793230b2f", 0x55, 0x800, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000300)=@mangle={'mangle\x00', 0x1f, 0x6, 0x668, 0x2c0, 0x118, 0x3d8, 0x0, 0x118, 0x598, 0x598, 0x598, 0x598, 0x598, 0x6, &(0x7f0000000280), {[{{@ipv6={@ipv4={[], [], @empty}, @mcast1, [0xffffff00, 0xffffffff, 0xffffffff, 0xff], [0x0, 0x0, 0xffffffff, 0xffffff00], 'veth0\x00', 'erspan0\x00', {}, {}, 0x16, 0x4, 0x3, 0x54}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv4=@dev={0xac, 0x14, 0x14, 0x36}, 0x2a, 0x9, 0x54e}}}, {{@ipv6={@ipv4={[], [], @empty}, @private1, [0xffffff00, 0xffffff, 0xffffffff, 0xffffff00], [0x0, 0xff000000, 0x1fe0000ff, 0xffffff00], 'macsec0\x00', 'vlan0\x00', {0xff}, {}, 0x4, 0x6, 0x0, 0x6}, 0x0, 0x160, 0x1a8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x1}}, @common=@srh1={{0x90, 'srh\x00'}, {0x2f, 0xc5, 0x7, 0x8, 0x0, @dev={0xfe, 0x80, [], 0x1b}, @dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0xff000000, 0xffffff00], [0x0, 0xffffff00, 0xff000000, 0xffffffff], [0xffffffff, 0xff, 0xff000000, 0xff000000], 0x40, 0x40}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@rand_addr=0x64010102, @ipv6=@mcast1, 0xb, 0x31, 0x7}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "bde9", 0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@mcast2, 0x20, 0xf, 0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffff, 0xff, 0xff000000, 0xff], [0xff, 0xff000000, 0xffffffff, 0xffffffff], 'geneve1\x00', 'wg1\x00', {0xff}, {}, 0x2b, 0x41, 0x0, 0x78}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private0, @ipv6=@rand_addr=' \x01\x00', 0x3e, 0x2f, 0xf776}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0xd0, 0xd0, 0x0, 0xffffffff, 0xffffffff, 0x300, 0x300, 0x300, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ipv6={@private0, @private0={0xfc, 0x0, [], 0x1}, [0xffffff00, 0xffffffff, 0xffffff00, 0xffffff00], [0xffffffff, 0xff, 0xff000000, 0xff], 'wg1\x00', 'ipvlan1\x00', {0x80}, {}, 0x21, 0x7, 0x1}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x2, 0x8}}, @common=@frag={{0x30, 'frag\x00'}, {[0x100, 0x5], 0x7f, 0x10, 0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@empty, [0xffffff00, 0xffffff00, 0xffffff00], 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x7, 0xfff, 0x5, 0x4, 0xff}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000e40)={'nat\x00', 0x5d, "78f12070d4b99c54ebcfccd0e8f6ed0607ec408a624da839c8e2b2f9e2cf0f0762d455bc9076195965c13855f4cf2d9aecaf11015bfad136496d86830cbce5aa56856e0f21cce8264d72c58e454e85cec5e68a04465f64c5b5f08581a4"}, &(0x7f0000000000)=0x81) socket$inet6(0xa, 0x3, 0x7) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@can, &(0x7f0000000200)=0x80) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1704, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 3: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, 0x0, 0x0) recvmsg$can_j1939(r0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000080)=0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000100)={@private2={0xfc, 0x2, [], 0x1}, 0x48, r1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@local, 0x36}) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1705, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001700)={0x0, @ipx={0x4, 0xfff8, 0x4, "8ee3905afcb9", 0x9}, @phonet={0x23, 0x1, 0x3, 0x1}, @ethernet={0x1, @random="fe9ff57bf461"}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f00000016c0)='ipvlan0\x00', 0xffffffffffff0001, 0x3, 0xa}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202400, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x258502, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000040)=0x9, 0x4) 10:02:33 executing program 3: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffcff}, 0x78) 10:02:33 executing program 1: process_madvise(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001480)="9bcbdc3307b6a03b7960c4cafc951d7ebe1d8d5d", 0x14}, {&(0x7f0000000040)="088aadf5210e47ddb1f2778836fae95125b8a12c2c907b27196d3866b71bec84bd91d62043365d2dd2f62580def514ce5067ea53d722f41d83", 0x39}, {&(0x7f0000000080)="5c2e197d01618b898acc5ee8a0652e2ebdc468e9db0664b202854cb32ac3f7553f0eb96c2ef378e06d4a2f937903d858133d17868fc0d673ef27150c37d4a5264695d9b0367e47d7bae27e6188d1fc7ead0b0e63a00aa2866c324cc289409ba763478777f8990a012e9dbc043950a44ef3107cf1a409fbfab8c4d60bb37c2ae1e84b8a5133950401f82c5ec07a5b08a712682eda8de3fa361a03b4d53df8b568557f19a63c42a5ea146ac92e1156e67b7f18d620c68a1a6de835fb80a855d44c6b6812476b28", 0xc6}, {&(0x7f0000000180)="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"/4096, 0x1000}, {&(0x7f0000001180)="48765221a656ba439f6468c4edab4ef32ad4c94ae454cadc48e0db86331f344e77deb7b3612df7dbffd66099d3fc193f3540ff4bce0cbc26902dc09d334463b30e8ed52e613e7d3b2f8e9651755956c299241851a31b61d6968686f0388c05a1c32e3221ae273204c155ed1c7d690e9551d43e1d180b355e7185b386c384d261b6cac65273ee99f84dbab9a526ef7bc6c41e18771826bf24456b514abd6723ff37831b9cfc32bf28eec9ab92d67b505a6dfbe574079c237ebf4398b202d98b73", 0xc0}, {&(0x7f0000001240)="2114e279a06c71306ec423d574de33d810fdc3b6374f7f47e626e314ee8c9cec5eea1bc459047f95063571ec95c8a16e64825fd4adce885c", 0x38}, {&(0x7f0000001280)="27157cf110abbc9ba293e3fed9fb23c9dbdfe40c680cdd23e76cbd91db8ed4f987531a72385697b4131262336e096dc13c286d1a69bfab5584723ae6bdca706a8a9fdeb85adfbbacb5d4f759e17e008f821cff04746ee90c28ef350329ac9021bc56b3600a9395b20c69c6891fbd2527d5dfe186ae8bbabbfda0c42a6edc1698f3cffc1362415aa18227fbfa4bfa0f5d3ead867c411bbce4082c5bd47b4d60674421088a35dc91e756da12196817bfa5f6a678bfd3e1fe9c7f0d07813e4a441e23420aac3d11c0259bbd8a420de084f211ea14990d0f", 0xd6}], 0x7, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x28, &(0x7f0000001400)={0x7, 0x6, 0x6}, 0x0) 10:02:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001700)={0x0, @ipx={0x4, 0xfff8, 0x4, "8ee3905afcb9", 0x9}, @phonet={0x23, 0x1, 0x3, 0x1}, @ethernet={0x1, @random="fe9ff57bf461"}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f00000016c0)='ipvlan0\x00', 0xffffffffffff0001, 0x3, 0xa}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202400, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x258502, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x1f) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_io_uring_setup(0x3e0d, &(0x7f00000000c0)={0x0, 0x968e, 0x0, 0x3, 0x10009e}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000180)=0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r1}, 0x8) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1706, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000080)=@buf={0x4d, &(0x7f0000000000)="9bf69f8d0579c617ab0d45172aed53180394ca53d837507f854ccf920a755950f8ef1820066ce88e428cb17f45348ab9fa2cf45f717cb20b36a7e17f3733d14d91a35fe4ed020577d762e6eddf"}) 10:02:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) getcwd(&(0x7f00000001c0)=""/230, 0xe6) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x208400, 0x0) recvmsg$can_raw(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/61, 0x3d}], 0x1, &(0x7f00000000c0)=""/167, 0xa7}, 0x10020) 10:02:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001700)={0x0, @ipx={0x4, 0xfff8, 0x4, "8ee3905afcb9", 0x9}, @phonet={0x23, 0x1, 0x3, 0x1}, @ethernet={0x1, @random="fe9ff57bf461"}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f00000016c0)='ipvlan0\x00', 0xffffffffffff0001, 0x3, 0xa}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202400, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x258502, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 3: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000002c0)) recvmsg$can_j1939(r0, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xc0, 0x453, 0x20, 0x70bd2b, 0x25dfdbff, "393935775b98d3e704824663dafe9c81bcab7f89b1959c969a9aa4844e9c2d140585d3191d8289d9ee07923cfab6b979b21a83e3a599086e2785c0319641851f60caa8f9d71248dfde35acca4b79d10ff1b3fe41f73ee449bb70c2e8ae75fa7237ca9c7c557d9909b7a2069976e5a8a47beb749a291ef7fcd3c68930b1bc858caca8f069a49a3fccbb5bf1da9dadfa3412bd2a4393a7b5894aae6492b481d7cf7ad6bf8b2f95f107a39d247066e0", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x14000000}, 0x4000044) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x9a, &(0x7f0000000040)=""/154, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:33 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@raw=[@exit, @ldst={0x3, 0x3, 0x3, 0xa, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x10}, @jmp={0x5, 0x1, 0x5, 0x8, 0x0, 0x100, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x10001, 0xf1, &(0x7f0000000080)=""/241, 0x41100, 0x2, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x0, 0x1}, 0x10, 0xcea0, r0}, 0x78) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1707, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xffffffffffffff95) 10:02:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001700)={0x0, @ipx={0x4, 0xfff8, 0x4, "8ee3905afcb9", 0x9}, @phonet={0x23, 0x1, 0x3, 0x1}, @ethernet={0x1, @random="fe9ff57bf461"}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f00000016c0)='ipvlan0\x00', 0xffffffffffff0001, 0x3, 0xa}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202400, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'tunl0\x00', @ifru_flags}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xfffffffffffffdb0) 10:02:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffdfa) 10:02:33 executing program 3: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x0, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9bb3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x2a46]}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x58}, 0x1, 0x0, 0x0, 0x40884}, 0x4040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0xb) 10:02:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001700)={0x0, @ipx={0x4, 0xfff8, 0x4, "8ee3905afcb9", 0x9}, @phonet={0x23, 0x1, 0x3, 0x1}, @ethernet={0x1, @random="fe9ff57bf461"}, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f00000016c0)='ipvlan0\x00', 0xffffffffffff0001, 0x3, 0xa}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1708, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x80880, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@exit, @ldst={0x0, 0x3, 0xaba62e74a5e15c5f, 0x0, 0x8, 0x8, 0x10}, @map={0x18, 0x8, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40e00, 0x2, [], r0, 0x1b, r1, 0x8, &(0x7f0000000200)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x0, 0x4}, 0x10, 0xffffffffffffffff}, 0x78) 10:02:33 executing program 3: pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) ioctl$SNDCTL_SYNTH_INFO(r0, 0xc08c5102, &(0x7f0000000000)={"8eb133bbaf10c020433144cc4d977cb677b9fdd238a5751409d0a2cc3c94", 0x1, 0x2, 0x401, 0x6, 0x6, 0x0, 0xfff, 0x0, [0x0, 0x3ff, 0xff, 0x800, 0x5, 0x3f18, 0xb0, 0x1000, 0x3443a39f, 0xffff7fff, 0x10000, 0x8001, 0x200, 0x1, 0x5, 0x9, 0xffffffb1, 0x8, 0xff]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:02:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0xfffffffffffffda5) 10:02:33 executing program 5: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xb8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@ipv4={[], [], @multicast2}, 0x6}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r2, 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1709, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x6e6, 0x3ff, 0xedc, 0x1200, 0x1, 0x19, [], 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x40) 10:02:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x170a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0xeb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x3, 0x1, 0x3, 0x6, 0x8, 0xffffffffffffffc0, 0xffffffffffffffff}, @ldst={0x1, 0x3, 0x1, 0x5, 0x2, 0x8, 0x10}, @ldst={0x3, 0x3, 0x1, 0x4, 0x5, 0xc}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0xa, 0x1, 0x0, 0x1}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x8f, &(0x7f00000000c0)=""/143, 0x41100, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xf, 0x72a4, 0x5}, 0x10}, 0x78) epoll_create1(0x80000) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x24}}, 0x4000800) 10:02:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001a00)={'gretap0\x00', &(0x7f0000001940)={'syztnl0\x00', 0x0, 0x80, 0x7800, 0x8, 0x9, {{0x20, 0x4, 0x2, 0xb, 0x80, 0x67, 0x0, 0x63, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, {[@timestamp={0x44, 0x1c, 0x4c, 0x0, 0x7, [0x0, 0x20, 0x7ff, 0x0, 0xfffffffd, 0x1]}, @timestamp={0x44, 0x28, 0x89, 0x0, 0x4, [0x7fffffff, 0x3f, 0x9, 0x3, 0xff, 0x8000, 0x8, 0x5, 0x200]}, @rr={0x7, 0xb, 0xae, [@private=0xa010101, @private=0xa010102]}, @timestamp_addr={0x44, 0x1c, 0xcb, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x36}, 0xfffffffe}, {@loopback, 0x6}, {@private=0xa010101, 0x6}]}]}}}}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001a40)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffff, 0x4, 0x40, 0x500, 0x8, 0x40800000, r0}) 10:02:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x170b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0xa305, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18280100", @ANYRES32=r0, @ANYBLOB="00000000000001009500000000000000306801000002000085100000feffffff"], &(0x7f0000000080)='syzkaller\x00', 0x511f, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x0, r1, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x2, 0x9, 0x2}, 0x10}, 0x78) 10:02:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x2, 0x20, {{0x21, 0x4, 0x0, 0x3f, 0x84, 0x67, 0x0, 0x7f, 0x7d, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x10, 0x1f, 0x0, 0x5, [0x2, 0x4, 0x8001]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0xb, 0x4b, [@broadcast, @multicast2]}, @end, @lsrr={0x83, 0x2b, 0x8b, [@multicast2, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x1a}, @multicast1, @dev={0xac, 0x14, 0x14, 0x36}, @rand_addr=0x64010101, @remote]}, @lsrr={0x83, 0x23, 0xb1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x43}, @empty, @multicast2, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x35}, @private=0xa010101]}]}}}}}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001a00)={'syztnl0\x00', &(0x7f0000001980)={'erspan0\x00', r2, 0x80, 0x80, 0xfffffff7, 0x3, {{0x16, 0x4, 0x3, 0x1, 0x58, 0x66, 0x0, 0x8, 0x29, 0x0, @loopback, @private=0xa010100, {[@timestamp_addr={0x44, 0x24, 0xa6, 0x1, 0x1, [{@remote, 0x9}, {@broadcast, 0xfffff801}, {@rand_addr=0x64010101, 0x7}, {@local, 0x10000000}]}, @generic={0x89, 0xa, "540cea8dba2977ed"}, @rr={0x7, 0xb, 0x1b, [@local, @local]}, @lsrr={0x83, 0xb, 0xd4, [@broadcast, @empty]}]}}}}}) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a40)={0x2, 0x8, 0x3, 0xd160, 0x1c90, r3, 0x7, [], r5, r6, 0x2, 0x2, 0x3}, 0x40) recvmsg$can_j1939(r4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8001}, [@map_val={0x18, 0x3, 0x2, 0x0, r1}, @map_val={0x18, 0x9, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0xbc, &(0x7f0000000540)=""/188, 0x41000, 0x19, [], r2, 0x1b, r4, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xf, 0xfffffffa, 0x4}, 0x10}, 0x78) 10:02:34 executing program 1: ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000000)={"e6ad5430b02bcceb3493e9df336ff55716813c991c59f605c8f2c601527f", 0x3ff, 0x1, 0x401, 0x1, 0x401, 0xb3d, 0x1ff, 0x0, [0x0, 0xaa, 0x7fff, 0x3ff, 0x2, 0x7, 0x7, 0x4, 0x8, 0x5, 0x189, 0x3ff, 0xffff0000, 0x2, 0x7ca485b3, 0x4, 0x9028, 0x400, 0x3f]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:02:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x170c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@private0}}, &(0x7f00000018c0)=0xe8) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x13, 0x5, 0x9, 0xffffffff, 0x8, 0xffffffffffffffff, 0x20, [], r0, r1, 0x3, 0x2, 0x3}, 0x40) 10:02:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e22, 0x8, @mcast1, 0x9}, {0xa, 0x4e22, 0x9, @mcast2, 0x8}, 0x522, [0x7fc3, 0x200, 0x80000000, 0x6, 0x8, 0x8, 0x4, 0xffffffff]}, 0x5c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x12200, 0x0) r2 = socket$inet6(0xa, 0x2, 0x22) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x7f, 0x4e24, 0x35c5, 0xa, 0x80, 0x0, 0x3c}, {0x4, 0xa70, 0x7fff, 0x7, 0x100000001, 0x6, 0x7fff, 0x4c39}, {0x10000, 0x5, 0x401, 0xbf1d}, 0x0, 0x6e6bb7, 0x0, 0x1, 0x1}, {{@in6=@local, 0x4d5, 0x2b}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1d}, 0x3502, 0x4, 0x2, 0xc5, 0x5, 0x9, 0x9}}, 0xe8) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x1, 0x8, 0x20, 0xb8, 0x0, 0x401, 0x200, 0xd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x6, 0x7}, 0x9490, 0x1000, 0x3f, 0x2, 0xffffffff, 0x3, 0x6f}, 0x0, 0x5, r1, 0x12) recvmsg$can_j1939(r0, 0x0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0x15e, 0xc4e1, 0x29a5, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000040)={r3}) 10:02:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:34 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x1, 0x2, 0x1}, {0x9, 0x1, 0x7, 0x39a1}]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 10:02:34 executing program 5: ioctl$SNDCTL_SEQ_GETTIME(0xffffffffffffffff, 0x80045113, &(0x7f0000000000)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1ab000, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000040)) 10:02:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x94, &(0x7f0000000380)=""/148, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:02:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 2136.226736][ T36] audit: type=1326 audit(1615716154.266:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14795 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x465f69 code=0x0 10:02:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in=@private}}, {{@in=@local}, 0x0, @in=@private}}, &(0x7f0000000400)=0xe8) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xdbe50e38e9508ed4}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x70, r2, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private0}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x0, 0x0, 0x1, 0x80000001, 0x9]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x7ff, 0xffff, 0x5, 0x3ff, 0x9974]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xf2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x70}, 0x1, 0x0, 0x0, 0x8804}, 0x40040d1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x40000, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x6, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x71}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1}, @map={0x18, 0x1, 0x1, 0x0, r4}, @exit], &(0x7f00000000c0)='GPL\x00', 0xfffffff7, 0xf5, &(0x7f0000000100)=""/245, 0x41100, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x0, 0xffff, 0xff}, 0x10}, 0x78) 10:02:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 10:02:34 executing program 3: syz_io_uring_setup(0x530a, &(0x7f0000000000)={0x0, 0xf151, 0x2c, 0x2, 0xe1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_memcpy_off$IO_URING_METADATA_FLAGS(r0, 0x118, &(0x7f0000000100), 0x0, 0x4) 10:02:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@private, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) 10:02:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, 0x0, 0xfdc6) 10:02:35 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) pipe(&(0x7f0000004c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r1, 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 10:02:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xca35}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ldst={0x2, 0x8a9a779fb3037c94, 0x3, 0x2, 0x0, 0x4, 0x4}, @jmp={0x5, 0x0, 0xc, 0x2, 0x0, 0x20, 0x8}, @map={0x18, 0xa}, @jmp={0x5, 0x1, 0xa, 0xb, 0x8, 0x50, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4c, &(0x7f0000000100)=""/76, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xcd40, 0x6c}, 0x10}, 0x78) 10:02:35 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@mcast2}, 0x14) 10:02:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="94cc8af86eb6775976f0b6662426736a99049223326df59d8eb19f5e29e7c9ac8d9ef0cfb245406271a08277e5ce86dc6b7d2e81786baa7b0e6bcda98d5358146a5a4d857512730166468e32ff7397fdbe08cb8fc34d3413c7ce5b5fa5a65d9477c2f6e98bd3c21508bad51a1d5f8cca1454c91c14610448"], &(0x7f000