framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000004c0)={0x9, 0x4, 0x9, 0x0, 0x0, [{r2, 0x0, 0x7fffffff}, {r0, 0x0, 0x7a}, {r2, 0x0, 0x2e}, {r1, 0x0, 0x6}, {r1, 0x0, 0x100000001}, {r1, 0x0, 0x4}, {r0, 0x0, 0x5}, {r2, 0x0, 0x7}, {r2, 0x0, 0x5}]}) 17:06:29 executing program 5: r0 = socket$inet6(0xa, 0x8000a, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xb3, 0x80) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 17:06:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00t\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000e0000207c0000000500109500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) unshare(0x800) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d, 0xffffffffffffffff}, 0xfffffffffffffffb) 17:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r0, 0xd, 0x1}, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x1007e, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000004680), &(0x7f00000046c0)=0x4) mq_getsetattr(r3, &(0x7f0000000200)={0x401, 0x1f, 0x0, 0x2, 0x3, 0x1, 0xe98, 0xbd}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x402200, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r4, 0xc004ae02, &(0x7f00000001c0)={0x2, [0x0, 0x0]}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f00000002c0)=0x7fffffff) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000300)={0x4, 0xc2, &(0x7f00000005c0)="364c80e47b50a2287696f8b21aeb298e1630b2c097a6acefd15c20896680c1fcedb8d1913ce98111a8a8e48a5c2e4a2b5d5bbbd6abe3dae7ccca9022ddcad22b0089e219ca7a269ebf4ac6d351de01f20f9876de8dfd7b484a20c5e4d3e79e318b6a05ff682a91d3324f714c049c8327a9dd00b8cfd18b0182fbd9ecd52966b8bf27da253eb13a18538cf09e314e890e71cfb0c77fdd1dbca22ad86d80a154513eec833e4b73db35f246dc98aa06ac723b93ce69205c15b97ca7876e48811ac9a8d7"}) 17:06:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x408080, 0x0) fremovexattr(r1, &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x7, 0x3}, 0x10) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000000)=@buf) 17:06:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xb}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) [ 348.538788] IPVS: ftp: loaded support on port[0] = 21 17:06:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00z\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:30 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8000, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$unix(r0, &(0x7f0000000140)="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", 0x1000, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r1, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 17:06:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000cfa21ac5ccdc000000000000000000009500000400000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000100)={r2, 0x0, 0x2000, 0x1000000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x200000, 0x0) [ 349.253393] IPVS: ftp: loaded support on port[0] = 21 17:06:30 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) exit(0xffffffffa0018000) syz_genetlink_get_family_id$ipvs(0x0) 17:06:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfff, 0x200000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x1, 0x2}, 0x10) 17:06:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000300000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000bc80000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x2) syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x20000) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x5) 17:06:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\xc0\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) 17:06:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cg\x00\x00\x00\x00\x00\x00\x00\x06/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x8, 0x2}, 0x1b7) r1 = semget$private(0x0, 0x3, 0x6c2) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x0]) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000080)={'lo\x00', 0xffffffff}) 17:06:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r1 = accept(r0, &(0x7f0000000000)=@isdn, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r2, 0xa2b}, 0x8) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000400), &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfffffffffffffffc}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYBLOB="0500040001000700080003007e68fc242ac07f63c3cef2ff2049b39c553efdd6f2029c77629392c39b728f677be9973b75179c6f9ab6985212eba29eb3111cfe1b81922c66b49d280bb7389c8ce1a3abed979e7eb8eb522dd49349dfef8f511f195df79c41becb050fe407e9eafc8a95119914839c1301294555bea09298dcc25c9fb0739f4f347360cd7632c897f3378e1287c6031d3c28826c156000a0d70a93003c56b1be59494c1cf91743faabd5606073512e487d0d77ea3262d40a33947ea37a14a75ec0ef6e060ffff4636ec2c5fc168073584e80156ecd5e"], &(0x7f0000000140)=0x10) connect(r0, &(0x7f0000000240)=@ethernet={0x1, @local}, 0x24) 17:06:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00 \x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 349.545356] IPVS: ftp: loaded support on port[0] = 21 17:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) write$binfmt_script(r3, &(0x7f0000000180)={'#! ', './file0', [{0x20, '[-'}], 0xa, "d9622a2be75534c6fbdbb3a97a844bf08611e52328d193bb47fb5069579bb797b6ad279ee4a3a4a99196478f789265b0339bb96274017865a9ae1b518c925cad23491e655cedf2f13b048010651c5e0292c8c5e36f33676d18e26a472d949a190b3eb75414fe546353640045f2e442104bca41b3595c5d7b9c5f447491111828295425b54026590808af06c0"}, 0x9a) 17:06:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzk\x884\xfb\x15n\x9d\xbb;X\xa7\xa9\xda7\xb4;\xdb\xca\xa9\xac\xec\x86\xa9', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:31 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) exit(0xffffffffa0018000) syz_genetlink_get_family_id$ipvs(0x0) 17:06:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000005c85009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\'\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:31 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x440200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x106, 0x9}}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r1, &(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xfffffffffffffe27) 17:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) memfd_create(&(0x7f0000000080)='\x00', 0xfffffffffffffffd) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xf}, 0x10) 17:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000007825ec3da430dd49000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x802) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x28, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffbf12c6a1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 17:06:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xc000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000180)={0x4, 0x0, 0x9, 'queue0\x00', 0xfffffffffffffffb}) write$sndseq(r1, &(0x7f00000004c0)=[{0xfffffffffffffffc, 0x800, 0x1000, 0x4, @tick=0x8d6, {0x401, 0x400}, {0x3, 0x2}, @result={0x541, 0x6}}, {0xff, 0x80, 0x0, 0x421, @time={0x77359400}, {0x80000000, 0x80000000}, {0x0, 0x2}, @control={0x4, 0x3, 0x3}}, {0x1, 0x6ee, 0x4, 0x6, @time={r2, r3+30000000}, {0x6a, 0x9}, {0x3, 0x9f5a}, @ext={0x1b, &(0x7f0000000100)="ff6c25fe67677265fd46875d21af80f13bc3092cfa96bdda487ac0"}}, {0x17e, 0x6, 0x6, 0x1ff, @tick=0x7ff, {0x6, 0x8}, {0x401, 0x7}, @addr}, {0x2, 0x8, 0x5efdabe1, 0x400, @tick=0x6, {0x6, 0x10001}, {0x9328, 0x7}, @connect={{0x7f, 0x8}, {0x7, 0xffffffff}}}, {0xcbbd, 0x8, 0xffffffff, 0x8, @time, {0xc61d, 0x4}, {0x240000000000000, 0x7510000000000000}, @addr={0x5, 0x1}}, {0x6, 0x3, 0x9, 0x7, @tick=0xffff, {0xff, 0x4a9f}, {0x0, 0x4}, @raw32={[0x15, 0x6, 0x3]}}, {0x73c, 0x5, 0x2, 0x5, @tick=0x1, {0xf3, 0x4dc90000}, {0x8, 0x4}, @raw8={"1e58d1ff833a0770104ecbde"}}], 0x180) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 17:06:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00/\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 350.093306] IPVS: ftp: loaded support on port[0] = 21 17:06:31 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) mq_timedsend(r0, &(0x7f00000004c0)="6d152cffa154b03f308a3cb246137541fda664486353d07aebe9088b70f5add6c082fa4359bb20a81e6128e9732317125d379702f2eb3ffbd009949600fd1845b48a076619cdf3f0d734e1dde5a5db7f7b5507e91b4b84b42a476f85193909e87829dc0e2e42f966342de1338ac3de6c3f51be3d41c9ed09a468fd8a9fe2074368921625fcbb1f1b31ca5545c62f5b622012a892bbb3d8eebdbff1997ba399c873ff28aaf14469ae82dc3ace1d8eb45254000777808ea2b1bdf0bec4b4b82663d376c7a054251c", 0xc7, 0xffffffff, &(0x7f00000005c0)={r1, r2+10000000}) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000140)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x10481, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000180)={0x0, 0x6, 0xffffffffffffffc1, 0x7fff}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, 0xffffffffffffffff, 0xd}, 0x10) openat$cgroup_subtree(r3, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) 17:06:32 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) exit(0xffffffffa0018000) syz_genetlink_get_family_id$ipvs(0x0) 17:06:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x100000000) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000000c0)={0x6, 0x0, 0x2, 0xfffffffffffffff8}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000100)={r2, 0xffffffff}) 17:06:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000bfb74ff014792f79f7ff000000"], &(0x7f0000000100)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x40f00, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) gettid() renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x69f0a7dba111478) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1000, 0x210240) ioctl$sock_rose_SIOCDELRT(r3, 0x890c, &(0x7f00000001c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x4, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @default, @bcast, @null]}) 17:06:32 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x100, 0x0) accept$inet(r1, 0x0, &(0x7f00000000c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r2, 0xd}, 0x10) 17:06:32 executing program 0: syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x81, 0x40) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00mA\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x620080, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f00000004c0)={0x0, 0x0, 0x2080}) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000180)={0x10, 0x81, 0x9}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x2, 0x30, 0x8, 0x8}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r4, 0x81}, 0x8) 17:06:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000048f97d55aaabf0a60002000000000000000000d4fae92a03d2c2e71d898a0e22e57c740b2e2b2a11afb48fa77d9f7f40f98767a59f48412fc2a3b5aa8732305ac0c6b9a5e4e6bafd12086a00da42f8ebb8b1236ca72560b81e4e9cd475043e4e909bb5cc92cfd88957b2591f8fcf5ff63e798605030aa43b0f1c0ffb6074ab60e9da2536d2360044148aa54b331d71f1cc31a0e862f817ea08ae9b03224096d3ce54be698c93834f4f4d7dd38a4459a96f6e8ca2fd4c809a9b0cfbcf1810a3a4"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 350.557604] loop3: p1 p2 p3 p4 < > 17:06:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00H\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 350.616188] IPVS: ftp: loaded support on port[0] = 21 17:06:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x1d, r2}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x3, 0x3, 0x5, 0x7}, 0x6, 0x1, 0x0, 0x0, "0a7e6366ef9051fa"}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x4800) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 17:06:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000080)=0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1}, 0x10) [ 350.910534] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 350.979107] print_req_error: I/O error, dev loop3, sector 101 flags 80700 [ 351.011542] print_req_error: I/O error, dev loop3, sector 201 flags 80700 [ 351.019820] print_req_error: I/O error, dev loop3, sector 301 flags 80700 [ 351.028137] print_req_error: I/O error, dev loop3, sector 101 flags 0 [ 351.035015] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 351.038735] print_req_error: I/O error, dev loop3, sector 1 flags 80700 [ 351.042835] print_req_error: I/O error, dev loop3, sector 105 flags 0 [ 351.056531] Buffer I/O error on dev loop3p2, logical block 1, async page read [ 351.063951] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 351.070547] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 351.078961] print_req_error: I/O error, dev loop3, sector 1 flags 0 [ 351.085455] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 351.092793] print_req_error: I/O error, dev loop3, sector 5 flags 0 [ 351.099487] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 351.106879] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 351.113465] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 351.121298] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 351.128700] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 351.139539] Buffer I/O error on dev loop3p2, logical block 1, async page read [ 351.147070] Buffer I/O error on dev loop3p3, logical block 0, async page read 17:06:32 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) exit(0xffffffffa0018000) 17:06:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18fffffffffffffff000000000000000950000000000007a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x2041, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) sendmsg$nl_xfrm(r2, &(0x7f00000017c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x76e61f41695d0a40}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=@expire={0x11f4, 0x18, 0x1, 0x70bd29, 0x25dfdbfc, {{{@in=@remote, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x4e20, 0xf212, 0x4e23, 0x17a, 0xa, 0x80, 0x80, 0x0, r3, r4}, {@in=@local, 0x4d3, 0xff}, @in6=@ipv4={[], [], @local}, {0x401, 0x8, 0x10000, 0x100, 0x1, 0x6, 0x5, 0x934}, {0x3, 0x0, 0x10000}, {0x80, 0x6, 0x12}, 0x70bd25, 0x3507, 0x2, 0x4, 0x3, 0x90}, 0xf4a}, [@extra_flags={0x8, 0x18, 0x82}, @sec_ctx={0xa8, 0x8, {0xa2, 0x8, 0x1, 0x735, 0x9a, "ef34e65c7ce0d97d24cdeeeb4e3b255ac57e8413544a41e95a69ac8d2596e8a43ba50c4626cde2958362fedd237ece01628b6fd22a2372f92cb45db0f23e0f85801dfa13c147576bccaf65a0f22973cfbaaa621bfcce779d6ec2b8b39e2e215e85c73abf7a24ed806cc442b5c6d40490bfa4c195602d8ca5e1bfc75229993164fbb0c215c82695e556d11e7a6958378b9c15c6395e0ffe77750c"}}, @algo_auth_trunc={0x104c, 0x14, {{'wp384-generic\x00'}, 0x8000, 0xa0, "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"}}]}, 0x11f4}, 0x1, 0x0, 0x0, 0x20004010}, 0x20000040) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xf}, 0x10) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0xffffffffffffffff, 0x0, 0x10, r5, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r6 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x400, 0x80) setsockopt$CAIFSO_LINK_SELECT(r6, 0x116, 0x7f, &(0x7f0000000180)=0x3, 0x4) 17:06:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00L\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000d1c000)=0x4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x99, @dev={0xfe, 0x80, [], 0x1f}}, 0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x400, 0x400000) getsockname$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400000, 0x0) preadv(r0, &(0x7f00000012c0), 0x3, 0x0) write$P9_RLERROR(r2, &(0x7f00000001c0)=ANY=[], 0xfed2) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000240)={0x6, 0x1}) 17:06:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x4) 17:06:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000c917, &(0x7f0000000080)="e15a0adcde1dd8b4a4f772") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000009500000000000000682f9891bb706b0f09417aae4a58ad7a44aee18143e217aef43ff5a58c6546700eda7b61c51eaf639afd151a41aee4ed8ade334ba414f57c85d27482acfd572807834b4e0242bd1108bf348a2bca9cc40c8e87bb393869adbc293db28a09645497d39c7d0b874b2e7d7b28a263d7aa2c1db7233095b491382a186f7ebe140667c838edcb25309fbc458b9923e715756d4051ab39213d5a645cecc1264e90cfd1a683ffa33780e6857a1bb3ab4197d9dbbc60fafa3d6858070f77b09457c38214030ddce3ee50c5974000cc5b613048c05be69b0d4ce3a6471804442c3f94a6deb0be987c760000000000000000000000003d2b8a6adf6e01b639f061239cedb6ae8e75f0f614cecb4df6626dea0428cfde61123d85002ab55458d52bcc96"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x521000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f00000000c0)=0x3) io_setup(0x3, &(0x7f0000000100)=0x0) r4 = dup3(r1, r1, 0x0) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x2) io_cancel(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xd, 0x80, r1, &(0x7f0000000180)="b5dbdeea9a411edf650f5e6c1634c472f66a1aaa13a729d8a5c359e18af07a09776eb60db5e6e761fb2fc568c67f1893d8cf431d4822a71d836981d6a3196b462a94aec10a05b0191b2da2ec956166a64522e35b1147c1002237424c3e8258569ddff5d5e4e04bbbb457ee578aa017198a773b22107b46b74cdbbc1acf871b4eb1b5603719a4ec27e60929dcbcdce8b3039bcd375ae0", 0x96, 0x3, 0x0, 0x1, r4}, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) 17:06:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r0, &(0x7f0000000080)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x100000000000, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000200)={{0x7db4, 0x10000}, {0xfffffffffffffffb, 0x4}, 0xcb9, 0x7, 0x1000}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x5c}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={r2, 0x7b, "96bcea3b52be3d8e058357abc707c822fdaff35c3b2238c31d1155f943a2033d928cc149b3bdacd40ca8802eb94ed5354c98757ba9d0b844c3d969501bc228b093dc01c19b856f05e15f202bc7c5340beb6170651074640766a009135b7e3f36ff9fc86632f24bdba6be0bd34364740ebce58696124ce26846c38a"}, &(0x7f00000003c0)=0x83) recvfrom$rxrpc(r1, &(0x7f0000000140)=""/175, 0xaf, 0x1, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000400)={0x0, 0x0, [], @bt={0xa5, 0x401, 0x1, 0x7ff, 0x1ff0000, 0x8, 0x6, 0x2}}) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000280)) 17:06:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00h\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000065cd8eeaa719e854a7f52084950000000000000019bd732e2c498f1ed204cf29b9ebd24d1d3bcc856e5e2349ddf4e26e4f485255df60401bb116368192abfbcd2a05002f0b9f8cf2e2547289f31af3313644eb741668cb336680e74420b7b46f9504b38e000000000000009e02c4544732a0a6a3955843f568f617216fb03fae457ee8300000adc8962352c1f58df78abc4514f4cf"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x705080, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) [ 351.594219] IPVS: ftp: loaded support on port[0] = 21 17:06:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x8) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0xffffffff, 0x3, 0x4, 0x4, 0x2, 0x3, 0x800, 0x73, 0x40, 0x29c, 0xffffffffffffff7d, 0x9, 0x38, 0x2, 0xda7, 0x43, 0x3}, [{0x7, 0x10001, 0x7, 0xcd4e, 0x4, 0xffff, 0x3, 0x1}, {0x6474e551, 0x4, 0x19fe, 0x0, 0x7f, 0xffff, 0x1, 0x200}], "95225ac3ae1f4c432baf836d933b308d714a33ad4d48ce1e7ef53e928c7de731b35506f019d820bd20ba74a2d5505d243fd9d048a8322c0a059589a5b5b1db99d6d6802aa0c239b221aa4e14a3d723afa14d2eed95f7d77a4c76976e16f165989ac4623726b136562a48f2bc25de99", [[], [], [], [], [], [], [], [], [], []]}, 0xb1f) socket(0x3, 0x6, 0xfffffffffffffe01) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 17:06:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x6, 0x9e0, 0x3}}, 0x30) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000007d4f0cd27bcd7fa750cf190b9fc46d2f6acef5a6636a00009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:33 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 17:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0afc1f010000000000002b1e2200") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='.\x1d\x03group\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00l\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x18, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40080}, 0x8004) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000005d8e62de7679bbf000009500000042030000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000140)=0x4) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f00000000c0)) 17:06:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000180)='syzkaller\x00', 0xa, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x6, 0x210800) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000001c0)={0x3, 0x4}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cg\x95\x98\x9f\xcd\xb3\xf0\xb7~Q\x91roup.cp\x93/syz0\x00$\x01r\xa8\xf3QG\x8e\\\x83g\x8a', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd}, 0x10) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:06:33 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x2000, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000002c0)={0x0, @reserved}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x8, 0x7fffffff, 0x3, 0x3, 0x8, 0x0, 0x4, 0x7fff}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0xfffffffffffffe9a, "44d536c101860a9cee2dd9bb56d35c3ef767c0da9f36b85f5746171b154f22f86ce0fbf72c411ac4e952c6f45b3002233b1f76ce024453b674172e23ae6fbc0f20d547babe7e010e72c575e127c1c8a28cb4c962e04225417227ccce09f753cda722d3c54f7dd3a54186313ae59334c80bca04fa9c6527cc4ab7eed479b2485b4c32ad80a21361872b3f73358ece84e0cafb3a351008d106a244c99534d2a22598e52c3ff0a6274c9ff3c9328a8dfc6d46dee5ec0523e0eb3211182a8821b710980054effd69c0b49e52f8b2c4c2c0e63d3facd02881b8fd55f592a4629eaf2636a98116d5d37c3deac84f"}, &(0x7f0000000080)=0x35) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r3, 0x3, 0x9}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:06:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00Am\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 352.128637] IPVS: ftp: loaded support on port[0] = 21 17:06:33 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x4, 0x200000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000002c0)={"a47f3f6c775da0294ac9a34eb7e18bcbf46f74e5cc1d55fe0e1df868ecb261e47ae334c6b7c19f32bce8b08034a57cf19f1d83fb7887b6ab383ca257efb80ebd852391d0a8e263590d6046ab9e62be3fdfad42484494da2ebddf0ee746322df293ec0509f9d9b55ce28d659dd212e4bd3fc42ba35d49aa9ea55d172fb1fa28c6ab428d829b382af2eda0b86dcb9ed6f190230dbaf6158e65932a8bd05df2b8f27448af7205eefa2cf4179efc687a924539c0cbd46b6fabb9f99ace010cbbcf5cd765011a73765b92c38ca8aa96d8c7550a1598f4a230373d2f97a228b03de3ffcee7ecb5894a6afc9b86dbd07bc018a7671d084e4394dcf1ede32b063e91a1b79bb08dda613365c8e0f33dfd53805692df270e2fbc5c0af3be41ff3fae19e7edb6d9619a61e596dbd78d4562ee3220c5e79cb2b0fe4d68ad76396661c10604a202d0847586bc495c4f12a92baebdd1dca3416c56879ad54feba4442e78c4d0708ceac8ae944705381e9f81295728da3ec4bdff34d486fedf424e02b4c33d833f9ea860ba65654468b80946f54cac2598b63387021d2ea4a1e039a36f0f34bb3f76d4c44a863993b9ced2ca218ad60dd5ea224a85583f14338fafabee0ab3e4f614a88763f59dfd68c22bcf93f7756b4a5cf02124d46830d0b44c11e48ca3fa99831d070928e72bf25f51810f4d50b8dab4f3898cf77e24b0853dc7954d072ee8fecaf8366be1f23ad373d2aef109673dfb95c90e220a941f6c00a63ce4369d5854d513bafafbbe44387a393a2bfd248cd662b241aab8b7961b1cf25a821f386b640b0c2e3a2e10452e1cbab34d272c0e9ddb951b75531d9260c797ae36970b755be2aee4b328c320198ff2fb0f048fc5e001cf95cbea46135517086ddcb80c5521f884b6f673b9bbc7f3cf37593f2e235d22a3d8411b107da45b6135ae5a6aaabb470330e58087b10127e442d1cd739aedb91d08df61685099dcba1153b7c9a1c2f02c445f0e9cf7c1f44c7e01ee7124ba404ce5aca03ca3c5d95b808d1f3c168dea72bd5cfe5a1d716cb9dd8262958abc91d7fe1fb74cbe1cea21df0206422c2263668f7bf2aa18c8243a3010df4d68a9c99e64a5179becd4a275de6ac1663fa3fcb03c857d9c58ab15ab3d14ab8ca76dedc9b6ea3239eedbdaa3e9780efcf274c2173c8c14b5531cf7ed6e1a9ac7a0886c5a4fc3171ffe295923f845efdec8bf2ab6f74edb1bfe859ec4ea2e8c2aeb9d69116a40bd1b816119cfa014f6f2469e419c307a62c51ea19b79f7a0fc7ef3f1d4a982035f2130f52d54913d5ee230f4e19829958b77608f4d8710f37f360dec289d8bcabbd0735545565d07a23e0085b567b250e49986f01a0612392ef68d5ec12500ca5eeddf45c3a810bb842d0fcc1bfab14af008f5ac0bcfa72db3b8f34a15ed90eb019f3b5614dbc8113da10c"}) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000006c0), &(0x7f00000000c0)=0x189) r2 = accept4(r1, 0x0, &(0x7f0000000180), 0x80000) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x5, 0x4) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x105800, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000007500)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000007600)=0xe8) lstat(&(0x7f0000007640)='./file0\x00', &(0x7f0000007680)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000007700)={{{@in=@loopback, @in=@loopback, 0x4e22, 0x3, 0x4e24, 0x1, 0x2, 0x20, 0x0, 0x21, r4, r5}, {0x3, 0x6, 0x8001, 0x6, 0x0, 0x2, 0x20, 0x4}, {0x9, 0x7f, 0x8b4, 0x3ff}, 0xbf, 0x6e6bbf, 0x0, 0x0, 0x2, 0x1}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x34ff, 0x0, 0x3, 0xff, 0x7ff, 0x7fff, 0xffff}}, 0xe8) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x5) recvmsg(r2, &(0x7f00000024c0)={&(0x7f0000000200)=@ipx, 0x80, &(0x7f0000002440)=[{&(0x7f00000025c0)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0x70}, {&(0x7f0000002500)=""/190, 0xbe}, {&(0x7f0000001440)=""/4096, 0xb3}], 0x4, &(0x7f0000002480)=""/46, 0xffffffffffffffcf}, 0xfffffffffffffffe) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000140)={0x8, 0x15000}) connect(r1, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 17:06:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x80000000011}, 0xffffffffffffff33) 17:06:33 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 17:06:33 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat$cgroup_ro(r0, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000a9c6ed0000000000000000000095000000000000005ef72fc836ce59cf675f3ad7af287eacd8cb07f6f0c771351e0331700e2599022d0cf51b7c3c4155696036dac981ceb6c41069d3949d686e94d7e862b2"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd}, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000002c0)=0xc) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000004c0)=[0xee01]) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r5, r6, r7}, 0xc) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000580)={&(0x7f0000000540)=[0x5], 0x1, 0x1, 0x1, 0x9, 0x1ff, 0x7, {0x6, 0x0, 0x4, 0x109, 0x2, 0x40, 0xffffffff, 0x7fff, 0x3288, 0x97c, 0x0, 0x1, 0xffffffffffffffff, 0x3, "edef38551521bc56f03ebbfbe4e579c5434ac57b2e0525a68beb96ddf4d7d451"}}) 17:06:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40020000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000100)={0x0, 0x101, 0xffffffff, [], &(0x7f0000000080)=0x6221}) pwritev(r0, &(0x7f0000000680)=[{&(0x7f0000000180)="51defa254e784e280dd6b4871080d8e2ab3344460f6456d0ab3fd2a4a53ea7d28bbf504cd029513ec461c2f6cd", 0x2d}, {&(0x7f00000001c0)="f2e5c300c098a91f23f1692bb4c3a7cabd773a83fba97d826a4699e8e5aa170cc4715abd47bb7df445873c28422fd2449d6a56aaf8ca073c35d4261f224ac47491f36902691178d4b5977d8a3c0d20b34a7b453f07dba1c6b37c9f95d1937cc12a3882b6cca919eba472c1f358fcd48b75a509961e715b221e2bd19b", 0x7c}, {&(0x7f00000002c0)="db149a1d52d34c607ef563", 0xb}, {&(0x7f0000000300)="c1b4fbb7d49b2e2d9cd0cea594ee023b5bbb1678a4bd0b5af89b1c34c4b321bbf4db185e0ab0c00e0b890490556dce300205d1cda01c24c34619715d99d2cba0bc3b7fe5b134a11d05b5436f925201477135ce8246719e87ed27755eb758", 0x5e}, {&(0x7f00000004c0)="fd16cd7483cbaf8d84fecada9e52ae2acb8e01b16e5986d7e8b1fc9f4bc1220121edeba3d7e843e54c8be3137617053abaf742c1bdd87a41cc3cacaf07ecd32b0bce55e85b48db8dc400432d298885f290b3a3bfd66512822853ef8fc5a1bd4f4904fc5328d4f29eef93071f49ba2769dc6a1512201b614b4e80a0c1c214f47e00a603cd6bee11c882c12bd488b0acd8b0ec1c2b42a39b376b11d26e4bd60c8c8be716f455bf0e98e123b5c4e156d203986acb15b4b50751c398a4d8853f59ba13cdcc60676fd277f5eb0963ce3322a128faf0ba438de7681ee9d1318776b23fcce801", 0xe3}, {&(0x7f00000005c0)="3ce6ee498a9056801e1349d0a6de5002ec0ae04ef73bbca6eb584695c2f86c97967e8906fc4182a67e29a314fd5bf8015746d8fb86ac057c7794c55a91fbec93bae89c812ed7419e3ced48802ad9fb1bdca1169e3214336694d6670cd53ce60c50c869da136037186dac0db602992f6bad315d6f3f16d2cfc62cc51b73f30ba68e64c1ecb5b18593111bcc3be9c053e86c9cbd1284714afd7dcf3499e24f961bc5dfcdb8c63aa9a8bf0c8ac5185d8bb2a98ebcc84867", 0xb6}], 0x6, 0x2) 17:06:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00t\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:34 executing program 5: r0 = socket$inet6(0xa, 0x80000, 0x400) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) r2 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x9, 0x6, 0x3, 0x8000, 'syz0\x00', 0x9}, 0x1, 0x8, 0x40, r2, 0xa, 0x1, 'syz0\x00', &(0x7f00000000c0)=['nodev@wlan0eth0\x00', '^,#\x00', '/ppp0cpusetmd5sum-\x00', 'wlan0\xd8\x00', '\x00', 'self)cpuset\x00', '\x00', '!\x00', 'md5sum\x00', '\x9d\xcb/ppp1GPL\xfbcpusetem1\xcd\x00'], 0x5b, [], [0x58c, 0x80000001, 0x9, 0x9]}) 17:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000000000000000000000000000000000001ab1cb6989cf097949ddafb774011f811222787"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000002000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7, 0x20001) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x3) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)=0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 352.559532] IPVS: ftp: loaded support on port[0] = 21 17:06:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0xfff, 0x4) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)={0x1234, 0xc, 0xb, 0x4, 0x70bd29, 0x25dfdbff, {0xf}, [@typed={0x8, 0x6b, @pid=r2}, @generic="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", @typed={0xc, 0x3a, @u64=0x9}, @typed={0x8, 0x8a, @u32=0x2}, @generic="cda6f487444bab80c81f7396d02731", @nested={0x10f8, 0xd, [@generic="176a4764ab3cfc127bc1979b5ed33b7b27eefaa5bd8f750686395bff5e5d82a5d1ae8cae3ae30c037b3d094635ed583bfe4b2073596ca2235a15be8c489f7ba2f11f6989bf5b3a41ebdf6881bf34aa2f4c0b3bee52ac5b23d621b9d7a747e6f53f0e7ea21d183090a9e77b387d94c1b510e7a3", @typed={0x8, 0x78, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}, @generic="df9a1d84c797eaf6395cafa6cebd3a7d7c4dd2bd54243754f52d2532d4dae0d5c074b4885fc45752d887b3d0524688df3aa6b3de5862f02aa0207835e25b20c68057911f55975e04fd25c83aa959fe8a9690b5ef0f74a4e3da1471c44afb13567fcc7dbdcf07a5a7ec9315aebba4cba220a6b0912c642ed5600c5a24f1694c430525426b2878f182f23aa672394562a8ccb743901cdccfe74542f461cf4e9d670359e208795c68e000f84d1fafadf504966b64cba4f28a40265a76dc3d25c0d06c3c43da203e33e616950d48ec563c853f869c9f4923b1af54b04468276c3c1921ca6bcacc82162fb760e8959b837aaae9c38d60aa71b440335dab28b740f514bc176964b0408428e3a5d2a15ae66768150eecc7c7e8a655424a80bc7d268bc10b5d6a59153908a54c8371156055ece9d708a1eefc4ed86de2f86db48f160fe8810858da05c23a0768863e5c5ad8f0e7f972232704fdc0eba367f0b38cd179f87f4d843ca19ed47053735e35b3f7dc3dcf923f10afa66597a6ad033490617e403b629247e8cc3d0a9298f5de2582ed6a2edade00ef1ce7356324fe45d8658b1fd85e828b05271689331468f115f23f0fd7b2caa731a4a241a9e2081bc6a4343a4f42eb2cea17885a6858fbd90d2db4a18ea1b71f9835b24a505efab985e869b847d721fa73859ed89e4f5501f89d72c3537cc9ca284f28e8de440e2379a887f6e7f209c24e02adb38c53d005955a64502a7aa4b1032ce275474d2e92fc952753477d8facfb7217f3607e38d269d84a62e2c53411a0fc2e47b4ca258e2e90e695d053401f82bd04e95486e6fc25f8006ae05603b4c3ac77fcb85810d22d91f7cf8216f6ebbfeef3f947530dbf71c74ef546520ad960d8f2ca9e78a6330f93cd9db1831a9ed406f93d1f5a7d567a1941b8e6ee41eba9d8f7dd2b0aced83946496dc2bff933974d20e55b2c5fa79ed7ef22af8e4d92ffa90af19ea4d8b3ed2848bfdb54709aafd74b8ed5bf90c3bf914655e000d4179118ece867c27cec425970bac7d00ce0978ab7a485f6d033fee89135708b673ed7426ce41b92b025509604761d35844326913029e12b63bed06fac1d614cbdadb5d843d40d03300e2a562ad08c6d55c4f03712f80b55961ae8391b67d9e41cd9cfad226ca3a4e75f3ea6f16b2c4e8f0194b72ce6a89c60c112a93bcf585eb3eb9137fe374600af9d3d1a0dbc8249bab4f547d45ba18bf96bb994f90cdd6fdebed365443644c70f8be5fc895953b0ab2013687e3f4d0f8e0688fb7ca5a6527217ecad74db368c0f0d6c8a01c3c13fc946ade4df5f64696729b12a2e43dfe5e7fd315839c34c4cdfeb7917cf6f6f34cbef30d4195e65fcd98babca6618521a651f40146ef23cd9f320253dd182b87248bce4ce237e815da1a26f2fc49f94a5d1fcfc7ec01bc9833ca9998a076994f3166c66eecc9ff88384c6178fa5db29e7ddb6e8c8d2d90be947296205a9fb5f4d78a7c53e33ab2c09dc3e3bdff7b972448ceef9a2826356050e1c0352f2623ffbde905e6e85c1bbf9a6dffcb16944e8f619b851bc9f0a2bb6c0da69999f23c1622101ee3eea8b8b160544f7a26a373726fbbee0d7bc1ca8d01ef501e0e7418a6d1bd931eb58a4b47c9a79632f5e6b1f87c24b1c42b0320a739ebd976f914df8e772f4d5f197c8621c8934056cf5e119c5f48df225e198b7753c95baa8f9b05ad6d1a6ec255280165a0b50b3c70d16c2790e2bc8239eb7d60b2fe81f7867179c6db93a2639528d4db92f6e3966f6b871f95ef194dbac4e894f36dbe9b99c875f8ed9694a1c631b47282bdb8088acb7f8e185161670df6a44d13771ef5f4f813099818c8d3357a8989bac07bba95a89fc33640ac0b2269b6ea9f61e97ac99be897e242478b147075a27390d04948862eea63ab6d2cb53a1536c1ef7750028867a6c39404981e580368f75904a15b7016f7f10d6d93212f78ebb24309a2273f7a58ceaecf5f3d0c7713eea072f1c48c125a647ea875358fc499bdbd91f559b8abaae895602482959cf6b34b166d23ee9acabd2032cd328ddc811b9c74f1329772bd479e9d4c7808224b0e1f52ab4b5d71f3894a40b315c964826e5f14d3c2160c76d9a22944663ecc76512b8e49c1d0e6a0e84a6e89a15881a5dc79cf83b29b8f73a400bd6743b10b8f178e70517fc7c6d468c0bc183e0b0672714a4f250f81becc3d1b6ea2fce45671e5de23b5577a19b95b9c2a1fb2693818cbcd1458d2b13fc44f048d8e331a7f8104b654d5c4c2e645b7b21a338cc108a96d1d2970cfe1c560413a0a49e6b4b24d83335861bdc516e572321091b5bf1697db8d895f311174ee827d6140ddd3e016af9600f92dbe53c327ae48e785627cd7f5aed59217f87bc0436a5590c1413f5f07bd88a899a8381d366da13a25254108f469d4a06f5004ccdadc141165fb3f3ce55b169ba4a609d27925ac091e3285242a6e2d612f540453a12c59064d51112e3a04921aca740e889b9b66445796d5f6623a92775ea15f5dc0259977f6377a4a492cd08ed1d427decc73331b70df286f5873290fec756533eec79311404f70a7378c76b0066ba95fbef99da89e7a55096077c5aa36c130e55cfdffbf389744db0faf6383b469d0d5a3684248532bbf72feb341feae4abbd3ec4c53d06541439b671515b44c4f6fddc1b29108409b01c5c4a2295d69c0ceaefe4b05560c3f48c16847481f07d0d4bb3f2e7883ba84ce7f789910da95065636056f395d67fb14e068c5f82e1836d2ef6ba0971acad688014e7f1d9b31014f0ba13b05cf92288e3852090b30207647f5ca486f3540eed6f18fef0d4ddb2f0ed8813884d905954673d49d5fe1fd31be68c259919e8601fadeebcbf9ebc3662ef71e0bcff8d9e49d89417897c655f96c1c8e02f2dbf5c2c895e6be1e032654816f6d59cfab13a31a367eab1e746d6e78ee7e3f8aa8dab4d1ef064c5038d612e282f1d83e03d76ae0b624eeb1978b1d72292fbb77a117ba3d1154cf33161f33ed74d660df85f96ebad6f16f04c1b6751f1494986491eb7bb3b4d5a64a15460b0bace920659dfc970ce7a3e86770d7738a2a4b185ac7cf4448049e8c902ad0479523bfbcbcbbae3a15c335dd7ee59d8b5c0df81f92c62e70a481fd9246b80fdda7242975fa8dcf8d241b34a6e0cb5047e6b13dc1dcbb7ea8c069c5db683c41a564da732b894d1920f5869780e82afc2ee22676ca201a4b826d4c22ba3f67ea790201d327fa52efc551029c747493940b835564cf45e52e2aed91e32628f7166ac646e8922458c7350fade10d59b2b920270a950962ededa8d74494ac0c3dc861b22a0ad735c809fbe30bf398671abcd49b7e2e682c859abd6152e0c7661048ea7b425ec9237dd89204763e255e14ea4712a9f8197c405521ce034a2a6ef1472ba90dec27a9a4d16c22fb314c665080ef5aca9686d9040851a07d6f79929e421868d7183ad7935f042f57a3f2005494a11d488c02050fe75dad047687cc1d20495f385a4bf00807720c0b97134682f77fbb68e6ba7e3b18c152e8bd5df44a8c2ef6e50c3317d8fab77a38a11dfa700d165093f8fbbf43c1d7a06e2fa86b8d215264e795b02788055072d6121ad847aebd586da27a32b53977c6af71aa0fa594d30724906a8ee81dbc534f9afe56497d6e60908f57c76537ae268f9cee4b24e1b808b83329e26873342cbbd1f48e096f86da74739c75cbd9f4daded7fd842a80dbcbb989fe61067a3846a2cb888dbc19b4f6f94541a51930a127eb344c2884697bb67ff3c7b49ff37f584cae689edc5fb00a273d66c08469b35b293791753c6363725c92c48ab06ef907d56c21011dbbb43198829febff4d9c157426e7182f987225f3a95b97fe6e9234ae738b4982924f5de3c0beddeb73cb26d1b1e1388c8e031ca4994c587ad225b8f6d124dedbce164931fd56fad72d42bc18c54138dab7a23a1050a5b75d7dd7aad64b9e9df9088d605d0728764608b9d2706868c2e82545e181d3acf7f2426d830b4662756fed8b9434e66d15fd90ee16292af32a97fed248d3cc1894d0963d24be1075094743c3de8f7263342dfae0804f66115c78726188adac7dff65812b0767434c81282604312088dfd38f2167ca39d8e48fa426dffbef8b799a6c5e404f18e88e0ed1b490865b8956a5a238cab3fce8ba96673e11da150e733eca704ccf4ec19eac22010ee190b4cf5a257dc04bf89cc23159f826f68061b61dc4915212539984fc0276ab1c2e0d25abed202ca57ed8e28c80ae4b4d4a1b7a53bf57a6b6682e2831c97be8cda32b624060dc72a3186063b310e436ed617cd4ea59eb5caa601ad5a5cd8bc4fac61255a59ebb2aec215e07bbce3257b5baa907308db814b57983aeebca67d0aec83c51e810c3955640593abd019ed46090780e4610a50b26c737256337be5f7631cf7b6c66b836ab44667bf23a99b8bb643f99eb497e6dc6925a4e690b35dadf3b17df2338dd57da890152e225fb3d38d18b07b7f13b84a755282f3dfd1287608b3752ded20a74dfdc0733a2f089bd48b9756bcf28d6558695e176c405fe08965db1744f08cf5b1b973c55c93d0ddcc87b8f25c5d45db46317812a8e4b0eff204bc206df4e65c93d46afc209658e2d2b1fe5c1b59f6c787943d777beec30a8628aa0dbfecd62a2cffdf99354a53cee355077a622af69d4480f3971717ed515cf700158d437e600c0c14722f53e4fb1c8a421aa541430efd95faca78a4e0d904b866976e2b458eee6776acc3b79cd7475381494dcba368c8c276538068b17e8166df762e573636123ec187ff01ae9f86fc6e776d8ea3e531ce6d2f4650ab7fa15b29cb5eff3f350de2f0b2d368e51175cb2e81fd175a6605310eb86c2cfa19f622f3ea10548ef51adc25852c72cdf5b5b2c93dc23650f3f32e051107af6b4683ccb1cb989ba195694eca74def367786b632cba0d9d033c6b26ed3cd7dff413f0d414b62a4e73c17ee4bfc00dea52b0adebbb55c632d9eb4d225c4be93bdf60478a4769b63ee6a1065520e7ddeecfe1acd610ddfa67f0a21f1919ca5c565a41e8efa2fd1cb907fb5dce4d17acb79a5db9631261f1d6589f8546a4643257be96befc5c9cd977440d66ea232292828895ada56f0cd363a5b0f57049f9c85a7629b27a0aa54f5a92cd994fc9b2858eab205498332e1ccd0c00dd13eb1be3d8befd4ce822c9d1594052a746afe9eb2a7627db4bec9dd33a808b8ca51ddf6e79e5effef9914c020a50afca0bc5ba88851a4123fda2d84c1ba540628d4e7bb8a857c559d2aa7f032eb9bba73996c434b04bf6fdc7c6507f30817dff8ff3b0049150146b1de11fee9a7280e5fc3b1b5e3792c7a0088590363e06bd37d166b3a0df12c8b86160e843e7d926e90d95977af2d6b4ecdfe0045c44a43e0b656c8c273dcf594687ee55ce875ca25c92de765e2c3427c9a1e2fe5a62944e2cd5e0f5fb5ca78d6175838056d832ec74f043c5fa8a399047bc5977f6cf3fcba2a4619e11568d0fbe58b32ff8aa8ed1b0d50a7f441b295a7fbaf46cd045f8d74e8de6e1ca72e0081755adc1729a2d190cf2851b6fc7d3da888e03c80a14683ee7a211278dcc047adf41e25ac818c86ff20251e1960b502d437f42df17a6721972415e452239049ca70274d12f8252b77f23144e7d6747dec1c74a170da713ea891569dd15e030ec5226922450bf658e60ef41c619eaa3c5e0999ede36480178b1f4b4a848585089e994f396e4c534219a5c5693266ed5c87a", @generic="1f93dacc54ee1e9c47e5385a819eab79a0fdd90e8dd5da4b808fb53abc7242fbf2d1c3", @generic="ceb655524024fbdd580c4dcd231332ec96eee04d0d54781dcb4ab22fc37f0ed13b2c00daea811b8f2610b6dd714620c38c3f8de0373ae6ce36ae97e94dadebc9a067d69f5d124a21b7", @typed={0xc, 0x62, @u64=0x2}]}]}, 0x1234}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) connect(r0, &(0x7f0000000500)=@rc={0x1f, {0x9, 0x800, 0x40, 0x5, 0x7, 0x7}, 0x8}, 0xd7dd4e01) r3 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="3e4644377425c38c90ec98aea2817d83ffd3bfbd5d997b9a769901a19c7316aaead54184613bedf67b5d0c144c8dca0165ca8d", 0x33, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r3, 0x62) 17:06:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00z\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4103, 0x10800) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x63, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x10040, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:34 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 17:06:34 executing program 5: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffd) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x200, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x468, 0x1fe, 0x385, 'queue1\x00', 0x43e4d803}) connect(r0, &(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x5e) 17:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) prctl$PR_CAPBSET_READ(0x17, 0x23) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000180)) 17:06:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\xc0\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000090319abecbb0623d9b5941021eae1b060de14b6850f47a367e7d6692fbae1fafd9d359f91b00a2e25b786c2e325e7b182191e4863185167ad7c9a5ea5347da6ef9783ec7916b2b95fc6bc3db2b8564def83130284ade6880f991bac6cde14c927e7615bd8b0073a8943309b7dec0a897ceb827a025fb88503838c6765aa027105c911b7a68ce277dd3cadadfad73a6663f6d8f00f572f082bc70"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 352.960190] IPVS: ftp: loaded support on port[0] = 21 17:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000c6337edf4dfe9500a781a72ac6341d262920906434c205740cefaf381645aa7f0b8d84ab351aed1f127aebdd22138f2378fffdca0e58703c504c5f2ae81e6b9f895c9bb70c10f53a9472bc9f72244441d8f84de568343cbec40e5ee217786ce6847737bc90dbc26a5d66ffdc6baa1370c2cef0994d4f4895ffda09afc51709b43435ce2cda19c6eb5c8575d03a0000000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) mq_open(&(0x7f0000000080)='syzkaller\x00', 0x40, 0x1, &(0x7f00000000c0)={0x0, 0xfff, 0x7a, 0x4, 0x6, 0xffffffff, 0x800, 0x5}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:34 executing program 5: r0 = dup(0xffffffffffffff9c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000200)=0xc) unshare(0x20000) link(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000280)={0x7, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}]}) ftruncate(r2, 0xa25) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000002c0)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000700)) ftruncate(r5, 0x2007fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000ffeffffe) 17:06:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\xa0\x01\x80\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xfffffffffffffe62) setfsuid(r2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x6, 0x3}, 0x2ca) 17:06:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)={0xfffffffffffffffb, 0x4, 0x7, 0x7fffffff, 0x3, [{0x2, 0x10001, 0xffffffffffffff01, 0x0, 0x0, 0x200}, {0x8, 0x80, 0x7fff, 0x0, 0x0, 0x2900}, {0x6, 0x81, 0x6, 0x0, 0x0, 0x81}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101040) 17:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f0000000080)={@rand_addr=0x3, @local, @empty}, 0xc) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @remote}, {0x306, @dev={[], 0x20}}, 0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, 'hsr0\x00'}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x01\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 353.320681] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:06:35 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) 17:06:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x800, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000180)=0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x371f, 0x4000) 17:06:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x02\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101841, 0x0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000180)) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x100000000, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null]}) [ 353.598162] IPVS: ftp: loaded support on port[0] = 21 17:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x800000000009, 0xa, &(0x7f0000000180)=ANY=[@ANYBLOB="380000000000000000000000000000000000000000000000c1b974077a1af84395cd9fb095ddb33391dadc8438e5575ab558611d279f449cb241ac78d9c66c2fdb9fe7952ae181dd79dddf53989dddcf16"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) setsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000080)=0x9, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0xfffffffffffffdd6) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4000c0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000000c0)={0x2, r2}) 17:06:35 executing program 5: r0 = dup(0xffffffffffffff9c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000200)=0xc) unshare(0x20000) link(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000280)={0x7, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}]}) ftruncate(r2, 0xa25) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000002c0)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000700)) ftruncate(r5, 0x2007fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000ffeffffe) 17:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x1, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x7af94136c5473203}, 0x48) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x80, &(0x7f0000002700)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/75, 0x4b}, {&(0x7f0000000300)=""/81, 0x51}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/111, 0x6f}, {&(0x7f0000002540)=""/147, 0x93}, {&(0x7f0000000000)=""/57, 0x39}, {&(0x7f0000002600)=""/78, 0x4e}, {&(0x7f0000002680)=""/94, 0x5e}], 0x9}, 0x10142) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000001c0)={0x0, 0xce7}) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$NBD_SET_SIZE(r2, 0xab02, 0xfff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x04\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:35 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) 17:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x202, 0x0) 17:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2000000000000063, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000095006117ea12e8424b100000000000df8064163c9bdaa7e26e7dd44a5d6cc4e69b9026474e3c8568668d51ac69b09ec737fac3c3ef6bab878caa455e68336af3991388b8b92c5c3976e935e01b54de32a22368bd3d02645bb3f4251f1e44f97d3755e1312be7fde0bdd94c1cb1ec7d4ae3f98000000000000000007a36e0525a01b00c5ae73c25357347637f8c71257b30d58aaf78f00f8996e0bf5b5ec558c14d6ae3e60538b2e192fe8bd9379530e21253f882595830be031a2c40e9cb3b869a88bd"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = socket$inet(0x2, 0x200000002, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$FICLONE(r3, 0x40049409, r1) connect$l2tp(r3, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) close(r2) r4 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) write$tun(r4, &(0x7f0000000880)={@val={0x0, 0x884c}, @void, @ipv6={0x7f, 0x6, "1f6faf", 0x163, 0x0, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, {[@hopopts={0x33, 0x19, [], [@generic={0x2, 0xc9, "0d3027e3df7230c1680ede5fd0cbadc8de1bbb43c6dd9a23f7afdc660b304c47aa16fd2b8f1aeeadcd12f13b8d822702972e6505d0115a530e784b699e3a5cdf48740ee9d06fe48b713276118373aa846f6b0e4db03aa32b23944668e4df42b6b087ad71080940c05cc69a6c2e3b416a2a5ef6e54a68e4056636a7eb45e683806d0d6cfdf3907bb06e8d53b9a0afcd5548f86aa5cf11f7f08f3f0a9582955f6c8b750bc321c4e33cbfd92a726424b93bda7d52502bfd844df395f7c723c97cc7ba182a6e6a2dd29206"}]}], @udp={0x4e20, 0x4e20, 0x8b, 0x0, [@guehdr={0x2, 0x7fffffff, 0x0, 0x8000, 0x100, [0x80]}, @guehdr={0x2, 0x9, 0xd2f, 0x5a, 0x100, [0x80]}, @guehdr={0x2, 0x9, 0x2, 0x100000001, 0x100, [0x80]}, @guehdr={0x1, 0x1ff, 0x3, 0x9, 0x100}, @guehdr={0x2, 0x80000001, 0x3f, 0x0, 0x100, [0x80]}], "ed579189a81ef0dfaec57d62b8c5297a38d7c41008b76b74233581a927022007b6f989284bb87c8326326e70a6353b989afb95679eb9f30be8017c10b1ef1ec6882fe00904556a4d25dc6a026e30c4364f303bda5ebfa23da51068eaffd3e2"}}}}, 0x18f) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xffffff08) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r6 = dup2(r1, r0) bind$bt_sco(r6, &(0x7f0000000000)={0x1f, {0x4, 0x946b, 0x6711, 0xfffffffffffffffc, 0xfffffffffffffffd, 0xd2c4}}, 0x8) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000740)={0x6, {{0x2, 0x4e20, @broadcast}}, 0x1, 0x1, [{{0x2, 0x4e20, @loopback}}]}, 0x110) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xf, 0x9, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x7, 0x7c, &(0x7f0000000180)=""/124, 0x40f00, 0x1, [], r5, 0x2}, 0x48) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RMKNOD(r7, &(0x7f00000002c0)={0x14, 0x13, 0x1, {0x0, 0x1, 0x7}}, 0x14) [ 354.336407] IPVS: ftp: loaded support on port[0] = 21 17:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ubi_ctrl\x00', 0x18440, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x94, 0xe3, &(0x7f0000000180)="5ec6b6ab981013e87a896c87ea13722d3b867d66ffe6c3c3d794033cae1d63f03e8219154ec019fe29fc25e61ef9e06248c84c55c2beb6f6fd3a421f9224824addfe219efd05bba79e744c135ffcf626bd089c4ad9a831a744b5f84317b68f2c99a3445c9a4e7f723595b0f9609882e9242753c992cb9bc0c5569b2af590c65e751c05c63b42d322afd34ed2d69cfccdc2a45326", &(0x7f00000002c0)=""/227, 0x7}, 0x28) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:35 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000340), &(0x7f0000000380)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x18000, 0x2) sendto$ax25(r3, &(0x7f0000000180)="64b3afc30e643c067e9e0aa1a25adec4a00d4fc60496db271b19c02d1a110b660ee769634a827b72c7d9db1ec41b9321fd094f9295cd6852c7299abfa4d3fe89144b4abcd565d6260e7d61497367ed1f7abc00371d56243c91be17c55d8695", 0x5f, 0x40000, &(0x7f00000002c0)={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 17:06:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00 \xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xb, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x5d}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800}, @generic={0x3, 0x2, 0x6d0e, 0x8, 0x8}, @map={0x18, 0xf, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='GPL\x00', 0x0, 0xc9, &(0x7f00000002c0)=""/201, 0x41100, 0x1, [], r2, 0xb}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x81, 0x101000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000080)={0xa6e, 0x16, 0x100000001, 0x2, "4f844cd2d9137dd9f4c7382c039f86b232222b063cb8b280e3d45486ed3f51fd"}) 17:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18ab1411057f0000000000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x4e24, 0xff, @mcast2, 0xfffffffffffffffe}, 0x80) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000200)=0xfffffffffffffdae) 17:06:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x169, &(0x7f0000000180)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x2000000000000005, 0x0) dup3(r1, r0, 0x0) 17:06:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x624, 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r3 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x54) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000340)={0x0, {0x77359400}, 0x4, 0x80000001}) 17:06:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\'\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:36 executing program 1: r0 = eventfd2(0x8, 0x80000) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000180)=""/170, 0xaa}], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000001000000000000000095000000000000000d073a912f5eaa39c02260ea0196586a0832b46a6eb4b9c472514d7b3c17e97bf3441ca3e761afe4d34666d9c9f015ec7da0ebe1ff0f9430a572b917dad1c7fe"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000004c0)=""/101) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x401, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000340)={0x56b5, 0xfffffffffffffff8, 0x0, 0x0, 0x3, 0x7}) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000100)=0x3) 17:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/icmp\x00') setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000002c0)=0x1ff, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) epoll_create(0xc0000000000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd}, 0x10) 17:06:36 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) 17:06:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:36 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)={{0x3}}) [ 355.389209] IPVS: ftp: loaded support on port[0] = 21 17:06:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x501400, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000002c0)={{0x5, 0x5}, {0x100000001, 0x9}, 0x3d6, 0x1, 0x1}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x200100) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x7fffffff, 0xa, 0xef2, 0xa5, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000180)={r3, 0x20, "aedc324fd6ad86279bf3d895cb18cdfe17251dc279a8bce493aaf7c049a072a8"}, &(0x7f00000001c0)=0x28) 17:06:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00/\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80101, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:37 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x80) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000500)={0x0, 0x1, 0x4, &(0x7f00000004c0)=0x1ff}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x20000) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000002c0)="f0bcd5037cc3a2779b9de5ede85865efee248e8c6b72aabb74b9b20449a34a117d01eeec250ad2233f00dc5200cb767e011ce6aef30f3e742b525d57fa7d9487e1897c621013cacd7fa1a4b5f1fa259887eaad41568957bd304826cb2c701a98d9970eea9336f5a40a9df5a3ed044260d8420f8425ed91783ac6b896daa5f1bdc54f40acf92bd4c2b40f592afc0efab11370884e8a35b77c25ec0071fe31b2c91a26b11ff1c5f4574e36f0800bb2d4ddbb8c028f35ff58ede067bc0047c0dea3e422faa48bc6c179be25a3c6549e80e4a60eede0282bec50f2bd23a538977c9a5f9d859cb7c9efb95a", 0xe9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000009865fb2331d57ea180000000000000429fabf842965c02c7de72d9e86231a5a2eb3e202dcff130d9919dd93e740127f5798cdcca88fd3050df3abbc0bdabf4830aea04ac57c361080000000000000059cb1f2119ba3590933a67539323a8938b1dc03950adefcc75c39c87a77d4e6a1693ad28a0b9071cf9b6a07241611bee4d86d17f529dfc3e63301c481e85c6ab2e58c01b5426bed11791dee552"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:37 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) fcntl$setstatus(r0, 0x4, 0x42800) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r1) 17:06:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x7, 0x5, 0x18, 0x80, 0x5, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1f, 0x8, 0x800, 0x8, 0x6c00000000000, 0x3, 0x0, 0x85, 0x0, 0x3ff, 0x3bb1, 0x9, 0x10000, 0x0, 0x7fffffff, 0x4, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000100)='rdma.max\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x3, 0xfffffffffffffdc5) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r3 = openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r3, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r3, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100), 0xff4a) write$cgroup_subtree(r2, 0x0, 0x26) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000000)) 17:06:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00H\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x202000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000340)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000200)={r4, 0x5, 0x2, [0x8b99, 0x7]}, 0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000001aa892874914aad6a08b3c000000000000efff0000e1000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0xffffffffffffffff, [], 0x0, 0xd}, 0x48) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:38 executing program 4: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x2, 0x0) 17:06:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="080000000005000000000007afb15dfa3555ed953e5b"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)=0x7) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00L\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:38 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x7, 0x5, 0x18, 0x80, 0x5, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1f, 0x8, 0x800, 0x8, 0x6c00000000000, 0x3, 0x0, 0x85, 0x0, 0x3ff, 0x3bb1, 0x9, 0x10000, 0x0, 0x7fffffff, 0x4, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000100)='rdma.max\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x3, 0xfffffffffffffdc5) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r3 = openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r3, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r3, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100), 0xff4a) write$cgroup_subtree(r2, 0x0, 0x26) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000000)) 17:06:38 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001540)="00000000003f657404c07f0c3e00") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000180)=""/130) ioctl$SG_IO(r2, 0x2285, &(0x7f00000014c0)={0x0, 0xfffffffffffffffb, 0x42, 0x6, @buffer={0x0, 0x35, &(0x7f00000002c0)=""/53}, &(0x7f0000000300)="6591d44a5bd234223d3dc64481c09b467c1bf733cac263148c569a80e8ba33a7472068f36fdbb46766e6fb00161bd3fd60d5d9405e1ba44d60a76a8578aeae8bbf7d", &(0x7f00000004c0)=""/4096, 0x100, 0x1, 0x2, &(0x7f0000000380)}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd}, 0x10) 17:06:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:39 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) mprotect(&(0x7f00007fa000/0x1000)=nil, 0x1000, 0x235ed095b2512efc) r0 = socket$inet6(0xa, 0x6, 0x7f) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@empty, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@remote, @empty, @ipv4={[], [], @broadcast}, 0x9, 0xa6a7, 0xbbc2, 0x500, 0x0, 0x1400001, r1}) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x1c) ioctl$TCXONC(0xffffffffffffffff, 0x40087101, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xfe) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r2, &(0x7f0000000240), 0x0) getpeername$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x3ac}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) preadv(r5, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) 17:06:39 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r1, 0xd}, 0x10) 17:06:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00h\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:39 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x1, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00l\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000014c0), 0x3db, 0x0) 17:06:39 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1ff, 0x80) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000180)=0x5, 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00Am\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) keyctl$set_reqkey_keyring(0xe, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 17:06:40 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000700affffe5150000", @ANYRES32=r0, @ANYBLOB="0000000000000000180000000600000000000000018000000050050003000000dd8f2000f0ffffff7b7efcffffffffffd0008000f0ffffff85000000080000000212ff035700000039f059cddb50cc10480878c49c826a65af4f1dbeeda7e2bf0602626b060ad04bb1eef7261cae12009b251ec99643e8f1c2e6b007a9432c79261de646b531fff8654980863db6184c47782a486c081eb4593c2f844ace037ce02f0dc15c39914f9a0ee7ace525ff1422221bdcfa1aa902000000000000003100f91bbbe2668c42778206da2663"], &(0x7f00000002c0)='s\x15q\x9d\x12\xe0Z\x05\xf1\x00WBU@\x19D\xff\x18A\xb6#\xc2\x11\x12\xa2\x11\xaa!\xcd\xc5M)\xf3\xfb\xdd\xb6\xa7\xa2\xc5NI\x94\xc4a\x8d to\xec\xac\xc5\x18\x05\xd1\xce\xdf\x03\x00\x00\x00\x00\x00\x00\x00+\x02D?;6\x1d\xe8\xb4\x963\xe0\xdc\x90\xdf\x8b\xab\r\xe02\xc1\xa4\x14\x85\x0e\xddj\x15}Ea\xca\'\x99\xfd\x00\x12\xeeXPo\xfb\x16\x83M\x9a.>\xe9\xd0\xfc@\x96\xcd\x96\x8ac\vu\xc1I{\x87k\x86\x9bf\xc4X\xcc*:g\xe7\xb0w\xdc\x8by\x1cT\\\xac\xd7S\xd0\xaa4\xd5u\xb8<,\xb7\x8b\x02\xd8\xf9\xb43\xedf;\xf8\x9b\xfc3\xf1C\x8c\r\x17\xaf\xa0\xa72(J\x80\x1ak\xde\xd3\xff\f-\xe4\x8b\xe6\x96D\x14\xa3\x14v\xd0\xdb~\xa0\x06\xc5\xa6\xe2\x96\xcf\xc9\x18t\xdc\xf6M\xd5\xed\xe1\xbd\xd8Fr\x7f\xcd\x86r^\xee}\x81\xeaK~[W0\xb7\x1c\x9e\xd1\xd4{\xd8\xea\xc2N', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r1, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000000c0)={0x7}) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000d}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, @ldst={0x1, 0x0, 0x2, 0xb, 0xa, 0xffffffffffffffe0, 0x10}, @ldst={0x3, 0x0, 0x7, 0xb, 0xb, 0xfffffffffffffff8, 0xfffffffffffffffc}, @jmp={0x5, 0xfffffffffffffffb, 0x7, 0x1, 0x9, 0xfffffffffffffff8, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x50}, @alu={0x7, 0x8, 0xb, 0x3, 0x4, 0x2, 0x8}]}, &(0x7f00000001c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0xb}, 0x48) 17:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:40 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00t\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000014c0), 0x3db, 0x0) 17:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000dca7b22a4ffac99d082449"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x70140, 0x0) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @local}, 0x8}}, 0x40, 0x273c, 0x80, 0x8, 0x8001}, &(0x7f0000000200)=0x98) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={r2, r2, 0x0, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000380)={r3, 0xb1c}, &(0x7f00000004c0)=0x8) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r1, 0xd}, 0x10) 17:06:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00z\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086610, 0x20000000) 17:06:40 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000080)={0xf, 0x9, 0x4}) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) request_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='em0$.\'./eth1}\x0fnodev\xf5cpuset}!vboxnet1&-.[md5sumuserwlan0system-\xe8em1vmnet1*\x00', 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 17:06:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x884, 0x0) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f00000004c0)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) [ 359.170234] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted 17:06:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x80\x01\xa0\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000180)=0x40, &(0x7f00000001c0)=0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd}, 0x10) [ 359.252686] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:06:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:06:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x8000, @rand_addr=0x7}}, 0x40, 0x7ff}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0xba9c, 0x0, 0x1, 0x9, r3}, 0x10) 17:06:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\xc0\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 359.543997] net_ratelimit: 2 callbacks suppressed [ 359.544006] protocol 88fb is buggy, dev hsr_slave_0 [ 359.554037] protocol 88fb is buggy, dev hsr_slave_1 [ 359.574062] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 359.643177] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 17:06:41 executing program 5: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f11103641afd3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x20040010) 17:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001ff) r2 = socket(0x40000000000c, 0x7, 0x0) write(r2, &(0x7f00000004c0)="2400000021002551075c0165ff0ffc0202000000fd100f0007e1000c08000e0000000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931daa4157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb7904", 0xe0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x1ffffffffffffe1b, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfffffe54, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x40) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x5, 0x1280, 0x2, 0x40, 0x1, 0x6, 0xffffffffffffffff, 0x4, 0xfffffffffffffffe, 0x7fff, 0x4}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0x7, 0x20000000000002}, 0x10) 17:06:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x3}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:06:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095001800000000f2c75645dc1a38cb9442e36194c4b30600"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x2, 0x1f, 0x3, 0x4, 0x40}, &(0x7f0000000200)=0x98) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r0, 0xd}, 0x10) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000004c0)={0x1, 0x9, 0x4, 0x40000, {0x0, 0x2710}, {0x4, 0xc, 0x5d, 0x81, 0x2, 0x0, "f4382721"}, 0x1f, 0x3, @userptr=0x7f, 0x4}) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000d}, 0x10) lseek(r3, 0x0, 0x2) 17:06:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\xff\xff\xff\xeb\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 360.103951] protocol 88fb is buggy, dev hsr_slave_0 [ 360.109102] protocol 88fb is buggy, dev hsr_slave_1 17:06:41 executing program 1: 17:06:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180800000000000000000000000000009500001b437222fa"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:41 executing program 0: r0 = add_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009d000000000000d5de00"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r6 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x5, 0x200) write$UHID_SET_REPORT_REPLY(r6, &(0x7f00000002c0)={0xe, 0x1, 0x2, 0xffffffffffffffca, 0x79, "05eff47c85a19c7e947f5be1ad4ed77e479149ced98824ff445347fb1e7afebc9cd23802bd97c2d10079ad07c26d278504099e4f2934da856aba489b5b8b77f064e8c60bf327a85d126e845d5d02e1283e7b6ead95f5dc3cf1798c6a93a11d5c20cc7158cde571ac87f63e20800986f3cb68dd8c80a43cce3d"}, 0x85) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000200), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000004c0)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x2, {0xa, 0x4e24, 0x32b2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, r7}}, 0x38) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0xc00, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r8, 0x54a1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd}, 0x10) dup(r3) 17:06:41 executing program 4: 17:06:41 executing program 5: 17:06:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\xff\xff\xff\xfe\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="188000000000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101002) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000180)=""/110) 17:06:41 executing program 5: 17:06:42 executing program 4: 17:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xf}, 0x10) 17:06:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\xeb\xff\xff\xff\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:42 executing program 1: 17:06:42 executing program 5: 17:06:42 executing program 4: 17:06:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:42 executing program 0: r0 = dup(0xffffffffffffff9c) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000200)='/proc/capi/capi20\x00', &(0x7f00000002c0)='bdev.*trusted\x00', &(0x7f0000000300)='/proc/capi/capi20\x00', &(0x7f0000000340)='/proc/capi/capi20\x00'], &(0x7f00000005c0)=[&(0x7f00000004c0)='eth0vboxnet1\x00', &(0x7f0000000500)='syzkaller\x00', &(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580)='syzkaller\x00'], 0x1500) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) getdents64(r3, &(0x7f0000000180)=""/99, 0x63) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000600)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r2, 0xd}, 0x10) 17:06:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\xfe\xff\xff\xff\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:42 executing program 5: 17:06:42 executing program 1: 17:06:42 executing program 4: 17:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000b2800c1da9500000016375862d131d946e5000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000009500f30000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:42 executing program 5: 17:06:42 executing program 1: 17:06:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x02\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:42 executing program 4: 17:06:42 executing program 5: 17:06:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="181000000000000000130000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = msgget$private(0x0, 0x1) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000180)=""/119) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) prctl$PR_CAPBSET_READ(0x17, 0x18) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x40000000000, 0x20002) setsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000200)=0x4, 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r0, 0x8000000000b, 0xfffffffffffffffe}, 0xffffffffffffff5c) 17:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000180)={0x18, 0x0, 0x5, {0x1000}}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000e1e5e93e162d640100050000000000100100000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x20000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:42 executing program 1: 17:06:42 executing program 5: 17:06:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x04\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:42 executing program 4: 17:06:43 executing program 1: 17:06:43 executing program 5: 17:06:43 executing program 4: 17:06:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x7, 0x20000) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, &(0x7f0000000180)="0f082e0f00da66baf80cb858ba8982ef66bafc0cedc4010554c3c7442400d5000000c744240200000100c7442406000000000f01142464360f35c4c26128b0070000000f01c92e3e650f1b7d040f0118", 0x50}], 0x1, 0x40, &(0x7f00000002c0)=[@cstype0={0x4, 0x1}], 0x1) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) 17:06:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\'\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:43 executing program 1: 17:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfff, 0x400) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000180)=0x1) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000009000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) pwrite64(r1, &(0x7f00000004c0)="f75127bb05b132cd5738e7bcb43062d4cb998d71d1d11c61abc42ad589558075495376e3b40d7bfbabd57804ae72c5cfb6f5c3f9911b5d2f84a997f5ea52e9c8d07a554f733a398b0fac47f37a0f955dd91a8fd349b21b839bc9f562245f943285bef5d00a453b5e10fb5b1fd6a70a0b79039f5651e48e54e491d8d140654ece11bf6d70d9b0739c6e70479c3ab1415c0245de31215aa8529636b6384b1095528661ad83ef72857b02b5cf40f5a0894355cfdbd5ff440948b506c7397a8d44a76135cfe4c1e160949e49a69e008a630daa2514bb12838e9b991b968336cff09c87966ee5ef3f4b7ab92271093f28d39bc66a2aaa5d75a7c7bb172f69852096b1c22d295b46e690090ccf894ce213a3d914a505c62b802f598b2aea2c203163f837e4c8ed27c3b3fc5f8cc5c41e840337b76c214ff06ef3e9e091a698d9fdc56b6e7ec5eaa0ae9a624a694c80dd5db5bb94aad3b8aac24ae029fe87ef314f96dca34fcde6f1eec10e756e95b320c8a76efa61b096247feb0738c5819a0a20f34586d7392f3b90054f25cf890311ab235a9f03d5a5c83c82a476b55562545b99e35f6cfbef2f48d4a5d6a08c305bd10e5d0936ebe8385bb719f9950bd20f32dd6f75950b7fb2e3683da7177d23a62af4a589461e0dfbeebcd6dab6ec3767edc4d973d732ef339b6860bb88e4fcef343d06e5373fe62a81b07e93db850df90e045aad9ab3e9f55497d62b8ad9b5dff1407d917a6e71addcf0c00dcec26a3ceedae295672c6c05bf76e8bceb0161c6703cc800d818751a7936ced048923aeafea32d06f45f7841e9b286a39f6854193d0709970e2816a714431e5759ca750b6250ac0dbb65d86adc8fa11810bb3b209323617531c09eb80d506cd3a0441e09a13df1c2714564a4a07a97ddb1c92f0dd0efa93b4ad0cb4a98bf8af8bcc47355fa73f4d5f45349df02c79251bea8d071e9b873fdee3f44a14bcb706fcc03b18ff003941cff06f62d74b9c81455b5e279193d577214ec5c6340374dcf7fe8be89f4f80564f7b6f8be6e8b2b46225226e8a949c71f52085449dbedff9671c12f0d8587c46892ba2f58b0fdb334631c7aae83525929886fb32efe9d4cdcf2c353422399a1b2605f30530d718e09b36cc3f4a0fb8507aa233ff0945a0f04526f3730b70dc35f6ebe07b565f4f0f04251d163be9a6997319ebdede9b16e9ed308ee74b0eeca37c0696ffd371d4fede0a6ad88ae3b64511382915899351bcb033cdb6c838c5b463e1fe8626b09aff9996462a30dd8f55de4c035d397895b28834aa32dd23b5e2801357179e5fa09f4453da2d10ab6089fa8adfd0c29e2f190d9adda1f08c55cc3cbd53133625940df05802379375ffef6cd952b75197cf28d96efc0026c5fc42eab4328ed698f5d1c5883fa6aac4f9709399c7f34401302e09c85a781828ca9331a41389c1e81c49f23a21d011ce390fb547af38a0fc9f64940352bac8bf2c8ef35082196963b45645a166a7d36c822e7d06e5a1f0fe34b45f6ead4b0b87a6f5c3a9957da58f41698e84f5f6c6ebdf2fb9e54e98966e488cc75504ae0681848034b1b931284bfdcf87788e7dfb42e8044a632174bedf82b1eb04ae39b6390d1cc7e7f8750ce82f206cd64034ba84c8c335eb339629839daf78cd34e61463adfe9bd5c021f861e2cfa90d864e034dcd26c5117dc85bd035263beba480421b7c3c3048117da9bcbfb014b14ce6d436a3b8d836a8d3e83cf2de123248ac5b728226f3b3239cbf0b059a357c5fc90f2169b0efe778ec0adf38819e1ccd8f5dea1258c5c837c81fcd264c0886cf7913af68a97735fe383688ef190a2d4310e04b00090024aa86744d8de4bfe22ae45e9e264dcdc916b62cee40ac54d199f5f763c2c199ec92cc9aa3a2a6e971cd27dfa8099c1658ee232c8578a8859185ce5f4332584b6ceac99861918ebe9effece33c242d073ff4991b0d19ccfbccaca0b7956e0e0a3d68524bc7c01de8a733f8396e8987cefbd6f1cabde8645760595ba586cabfbf266699f56892a1d485e370dfcb0d210877b4aecd0f4bd00037f4c14cffe1392d5c01514a30df1320a6c43f6408608d64595dab110b696fe3d268152fa9eb17aad6cccf94832c9c64586c7979eac8606307105d1554bd8ddedfaf3cfcc503e9c4470f174bbb7e8cd56839de3abe640ce3a598fa663ed623d6e628cff5796b9556ca49246dda86df610c64d686d03a7cd252dbfc1e33666743bbe251aa5ae111020047fd5f22b00634847834cae0d4566b61dfd6cdcad1bc6f33f9e5509a3b3b3039d2b01b48cf7ae2a771978c9852e79ffa958bc637d635820149b8ac0fbb277d99596e0cdf535f7e5264801d49b3db14efdf5950808c1f8c85e24f8fd0545d3154697c811c1776f94d57203784b674a4fdbf0d083df559f6d933e9f2644b41e2c1b8ecfacadec3488ea5f01424f43bac5ec0c020cce2ba17ded08a68712528655cde6a93402bd646241722a9e87d1102ee6ce6533222a559994e80ed17d96436232908cf0814569b551db28ab9ebc8fb320f5ae770d1aa6889f88bf9a6eaa455051342b715eeead523dd0cf6a93243dbffae215160a89911a9a8b05918f73e3005ff9af713ddabd3a374f173040bd1087afc52cc97a45e22f213d61edd49aa1ea329efa3e406ea333ebd0d84b933b2612e721938fa51c9a825b851e29c91531c3a7119c9541c9617bcf5a856d24d88e0945f764c4d8ba82108585bf3d00b5dc7a7ac7a0d0337758149bdb1f7896c7aa61f879601f9c49d187f0ba66369dd01d18fc7577ea9cca3e8e6b6172616815271d75ad3ea0487ca9ff53f6d8572330e6904a11c97e0eacb615bc719f8f208e4243c5ea9288bb483369f7fbcb974a82c476978625ee5d4073b3d0a1e4bfa48e1ebfad1f6180ad8249e80266ab27bf31924fc93499bc68402513cb96c846a345f0db2a0344e2085d2cd4d38fcb6d1b0dd2a98cf32b48dfd0cf17e23129b21795a35405304efb4a1bc8b82d071b676fdd0180792381e3b1479c65cd04e8482ea2d4fb79d802e7a07ddc06c0ea276f04e9a8caa52dfe3cfd9b2d61d0c4f221d0973b5e8368f4d3fbb60420a0e900337e35f892881aea90c53b03ca93d134cd83676cf978e7a34debfa6b98b3f0e5c22b4aca478df92dec174a7448a06883eb6517cfc771b9d8f44df5eb532af6226e14dfeebdb3557a33d63f62cf4855ca7495d57fe486e01ad13f0675143ab46ea5d4f3a388db8dfb53ff2adc08dbfb7416fe94d29f67670a0444fcad07f270c72873c2ba394d7ccb0e6de20a334704a9fb6a79f67e5ccb4167e70abd121b721ddb98299abec2d337479f6cbf6e46fe2d523f2b3bb977f2264d72356a63fff003a7485bf8d6e59221d041b3d01a9456b2ba23fe912175279a8efe58cf3bee8c9f57f274f2262fa44a60d64ecf19d78f54ba9441a8a2adbb4409c68eb5c8edd5568294b4979a5833da32adb9f03c6fb81a41f18ebca758b5e364d6a76b2407f5bf086724519e987225e4bc8f2d56688c3c79fe525db1692089d209b2ccd0cdbf924d0096db77d80e4e19bdae71baaeaf634646a2e833b4181a53ee594fe7550792cb29724ff9ab26b14d49981b10f0592c056c7e559c013cac979dd0b2cdc3413211e61cadce14de51a6cf828b196865d22f3d9be02fe68b1d138b16e25e2a1f5ccd2b500a4190254a4f149d1f7983ba013d69db6d5fa8545cf28fd3d6b76a119577d504a2d33f9de0838de6e93b05e4afa835661aa5f54612cf528a9cd3803f7d71ecb64e5a560fe303cf246b9bd1b7d2429ce24f1d29748652be0322a3a8a2fd6fc766eb3596d80323da95a697f917876e1737099dcba62e244d75721e438b1f891ef20e36cbd99895ac730d3829f03dedab3b20cb779a5ac6629895ed4190fc4062a61d02df675c866e37139d95c0e062e43bf55ee0cde14acfc1cf12a4aee3e17b3f35714d9fa9df8ff124e3b889d41633966bc8e04f749c47b430ce01d61b585037c6e2962f29c4e111185236472d9728b6e41f88edd39e9cbbd5b50f8ad3e60f2b58938561bff353ede52bb3f493f2a2aa359022aaf78a568ab2592ef25fd5310c6349eca3a75b1d6cdcb1b3de28940ca7a4093a49a224803beddcabcc0c236aefa06822c0557fb25cbee3d72a3be8ebe235aa269777cb0d8c36870def926b6c37a011f161bb26be7e7169a2d6f53d9b031f6227bc26765944f9a688fdbed0ca100eee2fec766fd81e8f0674f5454388af14845d666897ed7caffcc5c84830629e62506fc1fb301432b26c7d954a90820a49cbbd2370231524ff0072eb4274167cd64d92baff8f03c0fe3fcabff0d46f38e78d2631038087fa152bd978923c3a8435043b0633302c750b995b3d4f1aaaade92f021f023276aee1e612c8942d2e032dbc2dd606904d0e75846473d11a88f85e0dac9fb4ad4da3d53a3246bfbd64f2a4e1b7d3f84023719aa3b25af8cc5486a96585993b452ccf3a9ff3e5ef0eb1ba76b9e88cf071a70b5455417dfc4abe4b1f87f33fd4e09694bae80334f76639f624c5cf70e68c692d06ba420e2dfb46da9749654d544bf99435db7b374eca413dd65e000840b45c4380fe8a38a5f437e4b5043542bcc8fa74f11046f26731f9d6096a93416937bb591780b3970be413b1bb8cc4f613b93437d55b0f7a0512f76d40dfa4c1474ab8bcbcf917fa5a5aac1f19a1f4c0df4d0476df41caea490ec67e6eb267bfc6b0f394333e1c17663e785b4fac9e95cc95c9c1634c29577eb1c0c7b0c8975fa6716a8a4b76a7f22b796924620d890f21d6521d201a3247544d5abe69acac557e449e71878ec4075cf253d0ba85302c703ff554409c79ceb348031b683f95ae5e1d56452270e7207d18c495d9fea6bb2b8d2c7dc064e015640c7516dfa5e8b23328ce7cbf6ddd96269a116e864670c7fb3d161b8735aca2e45e08aa2383ec0da871b8d546e9b9a3cc5b72e54611a8a22dc1ef491f2ccb975b10e3d74cd8c48ac16e25b857c93b81da53142e812f010a0d77c4f2e124704603771cb4c3aded801cd237a5a1783204b7a11616d0679cca37a18fb16244f7d6ca246abb0e498e6a30b76b947c54370f2ed1beda02cc18cf56b42ca291f8076447c8dcdaabbf6d99c6e1c77c2ee0e274e701bc0a936eec0882bb95698abe62e96742f54072f4c8899e2597515cebda221cc486414b8fddb0d6063eb49d60065744977788d4f68b645d9cb500ed9bdac9e95df6ed4b6b5e98e1d4cb382b34387b4eac1cf15207d5ad4c799ba20125d7b230ec04d4238b449d6080cca3b7f2b39d548a8cb64f3e1a68081eaeb1be3a90a56f39e5b110a91d2853d440f2753acea9b27d15e89e2f9d9814d4cc449f61aac7e11a5b035f4017996b5803e0a05bfd32e7134939f451a0e89676a5cbac23339e414951b3fd29fa42cc16676d811cb080cef9deec75d16fdd7f93e40fb0ed7d9cca010820bf438b4a332a2b5da4c2469f4128a8c845960e8206120e4423449012495b7998666fb58153fa199dd73d5be887df6efce9372f34533b775163a2b8bc4413620fe166b5a7d6a39b769226d52331e242f5f4b24ea460c99b72f3b9776c95bcf2c735738c58f9265e184d17f2587aaa25a7b6e2cb04094b5e17afd22664f5b8d07fffdc16f6839f96bbbc346d2c008aaa6d80cfe1c3e1fff253317bfa108fa85a473b806a8aa8fd72ef4d380943ed73544df1a5577b45aa1963635c5b4bc27613eee744ebc92641518da980760ed457303b", 0x1000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000001c0)={r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 17:06:43 executing program 5: 17:06:43 executing program 1: 17:06:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="d6a0e097660125ec8600"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x101000, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x1, @null, @bpq0='bpq0\x00', 0x4, 'syz0\x00', @null, 0x6ea, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 17:06:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00/\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:43 executing program 4: 17:06:43 executing program 5: 17:06:43 executing program 1: 17:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x5000) shmdt(r1) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[0x7, 0x10000, 0x5c, 0x879, 0x1ff, 0x837d, 0x7f, 0x800, 0x1f, 0x2, 0x1, 0x0, 0x0, 0xffffffff, 0x2, 0x8], 0x3000, 0x20103}) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd}, 0x10) 17:06:43 executing program 4: 17:06:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x100000000, 0xf, 0x8, 0x7, 0x30, 0xffffffffffffffff}]}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0xfb, &(0x7f00000003c0)=""/251, 0x4, 0x0, [], 0x0, 0x10}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:43 executing program 5: 17:06:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00H\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:43 executing program 1: 17:06:43 executing program 4: 17:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f00000002c0)=0xc) sched_getattr(r1, &(0x7f0000000340), 0x30, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter\x00') symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r3 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000000c0)=""/37) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd}, 0x10) 17:06:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x8001, 0x0) bind$llc(r2, &(0x7f0000000180)={0x1a, 0x301, 0x0, 0xa59b, 0x2, 0x80, @dev={[], 0x13}}, 0x10) 17:06:43 executing program 5: 17:06:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00L\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:43 executing program 1: 17:06:43 executing program 4: 17:06:43 executing program 5: 17:06:43 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xac, "5b4dd554248c73d5edaeb335b7fb9ee31a87224be5a0f26716d135bd458e0d84e0e07bad97c3ec41ea528188dba9d3142fd2496904cb5506ff3c5b1fc96c912e35cf91a9eead76644f31e3b9b4e283284f801b4d9ccc8b63b49535949cb3f92d2fe5525f0ce69ac80701dbbfda94cff3d21cedeffda3fcf6b8ad3f0081e675605aeb9691f595e3e7f24a368c2822881ed5a3660152fd0a726e05f2fd185f34102f51b01c7abe33af6e1ea46b"}, &(0x7f00000004c0)=0xb4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)=0x0) ptrace(0x4213, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x4000008, &(0x7f00000000c0)="0adc1f023c123f3188a070") r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000150000000000030000000000000000a168ebd9d99236550aaf1c5a9f91126e7b0258dbb4507fa1b96ed215e53b04000000000000000cd12fa7c1d090c8cb2437dea99db9fd1c430aa35f7be8064d9647d9efb9b20838dfb236414cd31d8d4ed48a6375d00846e83ce701000000d6ef7696ed68855101d5cfb378a79ead15acde2f82efefe8780a4866dc276f500535881d17f739d4881aa97db4ef29437432280a0f061013d66fa50926593eb73751734009"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) sched_rr_get_interval(r2, &(0x7f0000000080)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd}, 0x10) 17:06:44 executing program 1: 17:06:44 executing program 3: r0 = socket(0x3, 0xa, 0x4) r1 = open(&(0x7f0000000180)='./file0\x00', 0x6180, 0x50) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000200)={r1, r2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="0bad1702000c00005dd2657600009500558797840000000096adc15076a4cdb0f343d28170d26478e268e7ad629dab5c66a6de620a1012f6a161f2734289d145400e11d97d15abf761dc51bf97cab326d77aec407295912309dc9bd0f8d5562c1e1abf588a97deba3d6ff76eb5eac2f5724089919d49ec4189b45a2b2344c3e3bc233ec48b99e1c9472372c8a2a8454cb112a13cb43de59c1f735d7bfad2bac3db9373a3305a9c140c74bb564a86ea73607718ee60aeacc9518ba56dae266806d509ea6cdc20b91d93b2bb296f7820d7959abd29423e9f3ca7a17c4a33eae69f0f6a493f7f"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x8000000000d}, 0x10) fsetxattr(r4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x12, 0x1) 17:06:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00h\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:44 executing program 5: 17:06:44 executing program 4: 17:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000080)="0adc1f023c12a6fb56bd88a070000000000000000000") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:44 executing program 1: 17:06:44 executing program 3: 17:06:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00l\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:44 executing program 5: 17:06:44 executing program 4: 17:06:44 executing program 5: 17:06:44 executing program 3: 17:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x14, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x1, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz0'}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000014c0), 0x3db, 0x0) 17:06:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) read$eventfd(r1, &(0x7f00000000c0), 0x8) 17:06:44 executing program 5: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="5500000018007f1dfd0000b2a4a280930a06000000a84309910000000e0008000a000c00060000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 17:06:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00t\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="33000000060000150e2726be876c000000000000001d00000000800000000000000000000000000a0000000f000000f1c0210000000074683000c38d36008ad64cba7b70fd0661fa64b99ec8c9a5f89d79103e075477b0b807cefec1c9c595c9a70cd3806d686c892670a7191fe50d32e85283"], 0x73) 17:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000017c0)={r0}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001840)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000001940)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x30000000}, 0xc, &(0x7f0000001900)={&(0x7f0000001880)={0x68, r2, 0x300, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x6, @media='udp\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x1}, 0xfffffef3) [ 363.121614] netlink: 41 bytes leftover after parsing attributes in process `syz-executor5'. 17:06:44 executing program 5: r0 = socket$inet(0x10, 0x2, 0x80000000000c) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="1b0000005200030f07fffd946fa283bc04eee6d87986c497271d85", 0x1b}], 0x1}, 0x0) 17:06:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00z\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x289, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r5, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x8, @remote, 0x8000}, @ib={0x1b, 0x10000, 0x1, {"86b42bc67e16feed51fbcef0116e9e80"}, 0x6b7, 0x5, 0xe000000000000000}}}, 0x118) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:45 executing program 5: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 17:06:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\xc0\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz0'}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000014c0), 0x3db, 0x0) [ 363.595336] IPVS: ftp: loaded support on port[0] = 21 17:06:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40201, 0x0) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000140)={0x2, 0xc18}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') flock(r1, 0x9612e450ebf86f3a) preadv(r3, &(0x7f0000000480), 0x100000000000021c, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 17:06:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008916, &(0x7f00000002c0)="0adc1f023c123f3188a030") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r2, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @ib={0x1b, 0x6, 0x8, {"eedf04eab0d8d056df6ae5338e97eb1b"}, 0xffffffffffffffff, 0x9, 0x3}, @ib={0x1b, 0xd047, 0xfff000, {"54976fb70842fc83889279040276ed9b"}, 0x7, 0x7, 0xfffffffffffff39d}}}, 0x118) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd}, 0x10) 17:06:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00 \x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:45 executing program 5: pipe2(&(0x7f00000001c0), 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}, 0x48) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 17:06:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz0'}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000014c0), 0x3db, 0x0) 17:06:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\'\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 364.141860] IPVS: ftp: loaded support on port[0] = 21 17:06:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xf, 0x1}, 0x84) 17:06:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00/\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x220d80, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000002c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000001c0), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1f, 0x9, 0x6, 0x2, 0xb, r0, 0x20}, 0x2c) socket$bt_rfcomm(0x1f, 0x1, 0x3) 17:06:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) connect$pptp(r2, &(0x7f0000000100)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) 17:06:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000007300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f2c71fef0aa7bac99638fad8839235e7a69fa22eac4078667bcb48df18d4dbed3bb126f2c3c9524d04e0804fc4f4ed9b82c10edc13e82815a6bf5248cd0cce079596c678f172f2e10b98a001cd45a56c30f099fc06a07764f37c411ef9359ec7b02a28bab822380e6db73b0390bad208bcca6d56095e2f0d06e8902d4f8894422555cd8c"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x100000001, 0x8000) clock_gettime(0x0, &(0x7f0000007240)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000006fc0)=[{{&(0x7f00000002c0), 0x80, &(0x7f0000000380)=[{&(0x7f00000004c0)=""/229, 0xe5}, {&(0x7f00000005c0)=""/216, 0xd8}, {&(0x7f0000000340)=""/16, 0x10}], 0x3, &(0x7f00000006c0)=""/210, 0xd2}, 0xffffffffffffffe3}, {{&(0x7f00000007c0)=@generic, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000880)=""/249, 0xf9}, 0x7f}, {{&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000a00)}}, {{&(0x7f0000000a40)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000ac0)=""/71, 0x47}, {&(0x7f0000000b40)=""/213, 0xd5}, {&(0x7f0000000c40)=""/240, 0xf0}, {&(0x7f0000000d40)=""/5, 0x5}], 0x4, &(0x7f0000000dc0)=""/128, 0x80}, 0x715}, {{&(0x7f0000000e40)=@ethernet, 0x80, &(0x7f0000002080)=[{&(0x7f0000000ec0)=""/156, 0x9c}, {&(0x7f0000000f80)=""/4096, 0x1000}, {&(0x7f0000001f80)=""/219, 0xdb}], 0x3, &(0x7f00000020c0)=""/86, 0x56}, 0xfffffffffffffff7}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002140)=""/81, 0x51}], 0x1, &(0x7f0000002200)=""/63, 0x3f}, 0x1}, {{&(0x7f0000002240)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000033c0)=[{&(0x7f00000022c0)=""/224, 0xe0}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2, &(0x7f0000003400)=""/29, 0x1d}, 0x115}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000003440)=""/110, 0x6e}, {&(0x7f00000034c0)=""/117, 0x75}, {&(0x7f0000003540)=""/106, 0x6a}], 0x3, &(0x7f0000003600)=""/115, 0x73}, 0x7}, {{&(0x7f0000003680)=@isdn, 0x80, &(0x7f0000004980)=[{&(0x7f0000003700)=""/133, 0x85}, {&(0x7f00000037c0)=""/200, 0xc8}, {&(0x7f00000038c0)=""/4096, 0x1000}, {&(0x7f00000048c0)=""/133, 0x85}], 0x4, &(0x7f00000049c0)=""/4096, 0x1000}, 0x570}, {{&(0x7f00000059c0)=@sco, 0x80, &(0x7f0000006e80)=[{&(0x7f0000005a40)=""/30, 0x1e}, {&(0x7f0000005a80)=""/128, 0x80}, {&(0x7f0000005b00)=""/29, 0x1d}, {&(0x7f0000005b40)=""/217, 0xd9}, {&(0x7f0000005c40)=""/4096, 0x1000}, {&(0x7f0000006c40)=""/4, 0x4}, {&(0x7f0000006c80)=""/225, 0xe1}, {&(0x7f0000006d80)=""/221, 0xdd}], 0x8, &(0x7f0000006f00)=""/159, 0x9f}, 0x2}], 0xa, 0x40, &(0x7f0000007280)={r2, r3+30000000}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000072c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r4}, 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) prctl$PR_GET_NAME(0x10, &(0x7f0000000180)=""/112) 17:06:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00mA\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:46 executing program 4 (fault-call:0 fault-nth:0): clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 364.988135] FAULT_INJECTION: forcing a failure. [ 364.988135] name failslab, interval 1, probability 0, space 0, times 0 [ 365.039655] CPU: 0 PID: 14384 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 365.046861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.056217] Call Trace: [ 365.058817] dump_stack+0x1db/0x2d0 [ 365.062468] ? dump_stack_print_info.cold+0x20/0x20 [ 365.067499] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.072445] ? kasan_check_read+0x11/0x20 [ 365.076617] should_fail.cold+0xa/0x15 [ 365.080537] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 365.085654] ? ___might_sleep+0x1e7/0x310 [ 365.089820] ? arch_local_save_flags+0x50/0x50 [ 365.094409] ? lock_acquire+0x1db/0x570 [ 365.098397] ? _raw_spin_unlock_irq+0x28/0x90 [ 365.102903] __should_failslab+0x121/0x190 [ 365.107149] should_failslab+0x9/0x14 [ 365.110958] kmem_cache_alloc_node+0x265/0x710 [ 365.115546] ? print_usage_bug+0xd0/0xd0 [ 365.119704] copy_process+0x405b/0x8710 [ 365.123689] ? __lock_acquire+0x572/0x4a30 [ 365.127984] ? process_measurement+0x268/0x1be0 [ 365.132658] ? print_usage_bug+0xd0/0xd0 [ 365.136730] ? __lock_acquire+0x572/0x4a30 [ 365.141003] ? __cleanup_sighand+0x70/0x70 [ 365.145282] ? __lock_acquire+0x572/0x4a30 [ 365.149538] ? mark_held_locks+0x100/0x100 [ 365.153783] ? __might_fault+0x12b/0x1e0 [ 365.157871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.163423] ? _parse_integer+0x139/0x190 [ 365.167580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 365.173118] ? _kstrtoull+0x17d/0x250 [ 365.176928] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.181860] ? lock_downgrade+0x910/0x910 [ 365.186015] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.190954] ? __check_object_size+0xa3/0x790 [ 365.195468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.201006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.206546] ? check_preemption_disabled+0x48/0x290 [ 365.211584] ? get_pid_task+0xd4/0x190 [ 365.215489] ? find_held_lock+0x35/0x120 [ 365.219556] ? get_pid_task+0xd4/0x190 [ 365.223462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.229015] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.233968] ? kasan_check_read+0x11/0x20 [ 365.238130] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 365.243434] ? rcu_read_unlock_special+0x380/0x380 [ 365.248379] ? __f_unlock_pos+0x19/0x20 [ 365.252373] ? find_held_lock+0x35/0x120 [ 365.256456] ? __f_unlock_pos+0x19/0x20 [ 365.260500] ? proc_fail_nth_write+0xa0/0x220 [ 365.265017] ? lock_downgrade+0x910/0x910 [ 365.269196] ? vfs_write+0x2f0/0x580 [ 365.272941] ? kasan_check_write+0x14/0x20 [ 365.277182] ? __mutex_unlock_slowpath+0x195/0x870 [ 365.282123] _do_fork+0x1a9/0x1170 [ 365.285679] ? fork_idle+0x1d0/0x1d0 [ 365.289406] ? __sb_end_write+0xd9/0x110 [ 365.293475] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 365.299024] ? fput+0x128/0x1a0 [ 365.302336] ? do_syscall_64+0x8c/0x800 [ 365.306327] ? do_syscall_64+0x8c/0x800 [ 365.310305] ? lockdep_hardirqs_on+0x415/0x5d0 [ 365.314893] ? trace_hardirqs_on+0xbd/0x310 [ 365.319215] ? __ia32_sys_read+0xb0/0xb0 [ 365.323303] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.328697] ? trace_hardirqs_off_caller+0x300/0x300 [ 365.333815] __x64_sys_clone+0xbf/0x150 [ 365.337806] do_syscall_64+0x1a3/0x800 [ 365.341700] ? syscall_return_slowpath+0x5f0/0x5f0 [ 365.346635] ? prepare_exit_to_usermode+0x232/0x3b0 [ 365.351667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.356525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.361714] RIP: 0033:0x457ec9 [ 365.364927] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:06:46 executing program 1 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:46 executing program 0: clock_settime(0x7, &(0x7f0000000080)={0x0, 0x1c9c380}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:46 executing program 5 (fault-call:2 fault-nth:0): r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:06:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00H\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 365.383830] RSP: 002b:00007fcbe072fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 365.391569] RAX: ffffffffffffffda RBX: 00007fcbe072fc90 RCX: 0000000000457ec9 [ 365.398851] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000802122001ffc [ 365.406122] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 365.413408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbe07306d4 [ 365.420675] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000003 17:06:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd}, 0x10) 17:06:47 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x102) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x1}}, 0x20) ioctl(r0, 0x7, &(0x7f00000002c0)="bdc20ed2c9359dc3011b70e7adc15b5c9dedab1d2549afd11dea4036a1eb2a91c1cd10707bb819bafd322622d0266c0a9951ac9fcac90370a47066b47aa8e6e05fbd4da86a0b881a3c970a7c9938e9fd7fb9416cad70edab08cf852d38d595107ffe5d1fd7f5f3d7255fd3f5dd37f7f9f74c88f8bb09a84274eb3cd6feb53debe3d44613ec5eb44794528e3dbe22ee9f23a14618e6dee7ba1e7f30484e62d109d33be345e110ad44e50b397f309a10a7414afd3d033b584f8d959542b5d26120ee97940222da6f6994025a05290d1265de5bb3b56c0d510f9a662ef9cdb3e28e545637173621b60a54843f67196e613ad7b67be2bbb82eedc8a5e32aac2c") 17:06:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:47 executing program 4 (fault-call:0 fault-nth:1): clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00L\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0xb2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x900) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2000) ioctl$VIDIOC_S_FREQUENCY(r3, 0x402c5639, &(0x7f00000000c0)={0x1, 0x1, 0x6}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) [ 365.695801] FAULT_INJECTION: forcing a failure. [ 365.695801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:06:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) [ 365.764164] CPU: 1 PID: 14411 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 365.771385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.780828] Call Trace: [ 365.783436] dump_stack+0x1db/0x2d0 [ 365.787104] ? dump_stack_print_info.cold+0x20/0x20 [ 365.792176] should_fail.cold+0xa/0x15 [ 365.796095] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 365.801215] ? arch_local_save_flags+0x50/0x50 [ 365.805803] ? lock_release+0xc40/0xc40 [ 365.809818] should_fail_alloc_page+0x50/0x60 [ 365.814322] __alloc_pages_nodemask+0x323/0xdc0 [ 365.819270] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 365.824290] ? rcu_pm_notify+0xd0/0xd0 [ 365.828628] ? rcu_read_lock_sched_held+0x110/0x130 [ 365.833655] ? kmem_cache_alloc_node+0x347/0x710 [ 365.838427] ? print_usage_bug+0xd0/0xd0 [ 365.842527] copy_process+0x847/0x8710 [ 365.846456] ? __lock_acquire+0x572/0x4a30 [ 365.850711] ? process_measurement+0x268/0x1be0 [ 365.855390] ? print_usage_bug+0xd0/0xd0 [ 365.859464] ? __lock_acquire+0x572/0x4a30 [ 365.863739] ? __cleanup_sighand+0x70/0x70 [ 365.867994] ? __lock_acquire+0x572/0x4a30 [ 365.872287] ? mark_held_locks+0x100/0x100 [ 365.876542] ? __might_fault+0x12b/0x1e0 [ 365.880615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.886176] ? _parse_integer+0x139/0x190 [ 365.890334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 365.895876] ? _kstrtoull+0x17d/0x250 [ 365.899688] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.904621] ? lock_downgrade+0x910/0x910 [ 365.908771] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.913703] ? __check_object_size+0xa3/0x790 [ 365.918202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.923742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.929283] ? check_preemption_disabled+0x48/0x290 [ 365.934315] ? get_pid_task+0xd4/0x190 [ 365.938211] ? find_held_lock+0x35/0x120 [ 365.942276] ? get_pid_task+0xd4/0x190 [ 365.946172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.951718] ? add_lock_to_list.isra.0+0x450/0x450 [ 365.956649] ? kasan_check_read+0x11/0x20 [ 365.960825] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 365.966108] ? rcu_read_unlock_special+0x380/0x380 [ 365.971057] ? __f_unlock_pos+0x19/0x20 [ 365.975043] ? find_held_lock+0x35/0x120 [ 365.979139] ? __f_unlock_pos+0x19/0x20 [ 365.983126] ? proc_fail_nth_write+0xa0/0x220 [ 365.987633] ? lock_downgrade+0x910/0x910 [ 365.991791] ? vfs_write+0x2f0/0x580 [ 365.995526] ? kasan_check_write+0x14/0x20 [ 365.999770] ? __mutex_unlock_slowpath+0x195/0x870 [ 366.004719] _do_fork+0x1a9/0x1170 [ 366.008281] ? fork_idle+0x1d0/0x1d0 [ 366.012017] ? __sb_end_write+0xd9/0x110 [ 366.016100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.021647] ? fput+0x128/0x1a0 [ 366.024938] ? do_syscall_64+0x8c/0x800 [ 366.028917] ? do_syscall_64+0x8c/0x800 [ 366.032900] ? lockdep_hardirqs_on+0x415/0x5d0 [ 366.037499] ? trace_hardirqs_on+0xbd/0x310 [ 366.041827] ? __ia32_sys_read+0xb0/0xb0 [ 366.045908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.051280] ? trace_hardirqs_off_caller+0x300/0x300 [ 366.056516] __x64_sys_clone+0xbf/0x150 [ 366.060520] do_syscall_64+0x1a3/0x800 [ 366.064422] ? syscall_return_slowpath+0x5f0/0x5f0 [ 366.069362] ? prepare_exit_to_usermode+0x232/0x3b0 [ 366.074413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.079319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.084516] RIP: 0033:0x457ec9 [ 366.087715] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.106628] RSP: 002b:00007fcbe072fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 366.114346] RAX: ffffffffffffffda RBX: 00007fcbe072fc90 RCX: 0000000000457ec9 [ 366.121615] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000802122001ffc [ 366.128887] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 366.136161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbe07306d4 [ 366.143432] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000003 17:06:47 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x2, &(0x7f0000000000)) 17:06:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x2, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:47 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x5421, &(0x7f0000000000)) 17:06:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000bfd000/0x400000)=nil, &(0x7f0000d00000/0x4000)=nil, &(0x7f0000ddd000/0x4000)=nil, &(0x7f0000d41000/0x3000)=nil, &(0x7f00000002c0)="dd88ee8bc8fee93b056ce64a0a3eeea489f00a774326d4d5629ef666323e52a414cc631390a5fea89f34c49ebac9339913d00adbd72029254c4afab1925ec35c0446055226c1a6e0b921309db0130466cb86818d0625580e40849006e711a21ddb913ad34df9c8e0bf07e994882d81044cf9691565e99d01110c0820df72841e4a79b55c59aec8846724743367284366d47e99b9fb2110b879aee6fd564faf9db24b866998d5571f1c6aa07a6bbf9c381ceb0eabde6d3847048304b8955e4eec4891ae8810b5adaf5e7e53c4232eb0017eeb55430089c5de7121b9cc34c9ac4d2274fbb45cf61b75ad39e67e42cf5f4b8587bae063", 0xf5, r0}, 0x68) socket$isdn(0x22, 0x3, 0x23) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x11}, 0xffffffffffffff05) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) 17:06:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:48 executing program 4 (fault-call:0 fault-nth:2): clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:48 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x5450, &(0x7f0000000000)) [ 366.587957] FAULT_INJECTION: forcing a failure. [ 366.587957] name failslab, interval 1, probability 0, space 0, times 0 17:06:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00h\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x4, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x2d) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)={r0}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x8, 0x20, 0x7, 0x7}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={r4, 0x2000000000000, 0x4, 0x4, 0xd27, 0xccd}, 0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) [ 366.644161] CPU: 1 PID: 14448 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 366.651398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.660760] Call Trace: [ 366.663365] dump_stack+0x1db/0x2d0 [ 366.667006] ? dump_stack_print_info.cold+0x20/0x20 [ 366.672041] should_fail.cold+0xa/0x15 [ 366.675954] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 366.681088] ? ___might_sleep+0x1e7/0x310 [ 366.685260] ? arch_local_save_flags+0x50/0x50 17:06:48 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x5451, &(0x7f0000000000)) [ 366.689849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.695470] ? selinux_is_enabled+0x43/0x60 [ 366.699809] ? creds_are_invalid+0x125/0x150 [ 366.704241] __should_failslab+0x121/0x190 [ 366.708498] should_failslab+0x9/0x14 [ 366.712480] kmem_cache_alloc+0x2be/0x710 [ 366.716644] ? rcu_read_lock_sched_held+0x110/0x130 [ 366.721674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.727231] prepare_creds+0xa4/0x4e0 [ 366.731040] ? abort_creds+0x290/0x290 [ 366.734944] ? copy_process+0xb3c/0x8710 [ 366.739020] ? trace_hardirqs_off_caller+0x300/0x300 [ 366.744132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.749672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.755249] ? check_preemption_disabled+0x48/0x290 [ 366.760293] copy_creds+0x7b/0x5e0 [ 366.763844] copy_process+0x1120/0x8710 [ 366.767844] ? __lock_acquire+0x572/0x4a30 [ 366.772096] ? process_measurement+0x268/0x1be0 [ 366.776773] ? print_usage_bug+0xd0/0xd0 [ 366.780846] ? __lock_acquire+0x572/0x4a30 [ 366.785136] ? __cleanup_sighand+0x70/0x70 [ 366.789384] ? __lock_acquire+0x572/0x4a30 [ 366.793643] ? mark_held_locks+0x100/0x100 [ 366.797893] ? __might_fault+0x12b/0x1e0 [ 366.801960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.807505] ? _parse_integer+0x139/0x190 [ 366.811665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.817211] ? _kstrtoull+0x17d/0x250 [ 366.821023] ? add_lock_to_list.isra.0+0x450/0x450 [ 366.825959] ? lock_downgrade+0x910/0x910 [ 366.830115] ? add_lock_to_list.isra.0+0x450/0x450 [ 366.835137] ? __check_object_size+0xa3/0x790 [ 366.839636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.845623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.851170] ? check_preemption_disabled+0x48/0x290 [ 366.856197] ? get_pid_task+0xd4/0x190 [ 366.860087] ? find_held_lock+0x35/0x120 [ 366.864154] ? get_pid_task+0xd4/0x190 [ 366.868055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.873607] ? add_lock_to_list.isra.0+0x450/0x450 [ 366.878550] ? kasan_check_read+0x11/0x20 [ 366.882729] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 366.888017] ? rcu_read_unlock_special+0x380/0x380 [ 366.892976] ? __f_unlock_pos+0x19/0x20 [ 366.896958] ? find_held_lock+0x35/0x120 [ 366.901028] ? __f_unlock_pos+0x19/0x20 [ 366.905020] ? proc_fail_nth_write+0xa0/0x220 [ 366.909526] ? lock_downgrade+0x910/0x910 [ 366.913695] ? vfs_write+0x2f0/0x580 [ 366.917426] ? kasan_check_write+0x14/0x20 [ 366.921667] ? __mutex_unlock_slowpath+0x195/0x870 [ 366.926607] _do_fork+0x1a9/0x1170 [ 366.930160] ? fork_idle+0x1d0/0x1d0 [ 366.933881] ? __sb_end_write+0xd9/0x110 [ 366.937948] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.943488] ? fput+0x128/0x1a0 [ 366.946775] ? do_syscall_64+0x8c/0x800 [ 366.950752] ? do_syscall_64+0x8c/0x800 [ 366.954727] ? lockdep_hardirqs_on+0x415/0x5d0 [ 366.959721] ? trace_hardirqs_on+0xbd/0x310 [ 366.964056] ? __ia32_sys_read+0xb0/0xb0 [ 366.968139] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.973504] ? trace_hardirqs_off_caller+0x300/0x300 [ 366.978638] __x64_sys_clone+0xbf/0x150 [ 366.982621] do_syscall_64+0x1a3/0x800 [ 366.986517] ? syscall_return_slowpath+0x5f0/0x5f0 [ 366.991466] ? prepare_exit_to_usermode+0x232/0x3b0 [ 366.996491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.001363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.006603] RIP: 0033:0x457ec9 [ 367.009827] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.028753] RSP: 002b:00007fcbe072fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 367.036471] RAX: ffffffffffffffda RBX: 00007fcbe072fc90 RCX: 0000000000457ec9 [ 367.043748] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000802122001ffc [ 367.051026] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 367.058318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbe07306d4 [ 367.065598] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000003 17:06:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:48 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x5452, &(0x7f0000000000)) 17:06:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:48 executing program 4 (fault-call:0 fault-nth:3): clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='\x00', 0x1, 0x3) syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x3, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00l\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x5, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 367.381132] FAULT_INJECTION: forcing a failure. [ 367.381132] name failslab, interval 1, probability 0, space 0, times 0 [ 367.435418] CPU: 0 PID: 14478 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 367.442655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.452063] Call Trace: [ 367.454671] dump_stack+0x1db/0x2d0 [ 367.458322] ? dump_stack_print_info.cold+0x20/0x20 [ 367.463358] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 367.468703] should_fail.cold+0xa/0x15 [ 367.472609] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 367.477748] ? ___might_sleep+0x1e7/0x310 [ 367.481905] ? arch_local_save_flags+0x50/0x50 [ 367.486541] __should_failslab+0x121/0x190 [ 367.490792] should_failslab+0x9/0x14 [ 367.494602] kmem_cache_alloc_trace+0x2d1/0x760 [ 367.494617] ? kasan_slab_alloc+0xf/0x20 [ 367.494630] ? kmem_cache_alloc+0x12d/0x710 [ 367.494648] ? prepare_creds+0xa4/0x4e0 [ 367.503372] ? copy_creds+0x7b/0x5e0 [ 367.515353] ? copy_process+0x1120/0x8710 [ 367.519512] ? _do_fork+0x1a9/0x1170 [ 367.523241] ? __x64_sys_clone+0xbf/0x150 [ 367.527399] ? do_syscall_64+0x1a3/0x800 [ 367.531486] new_task_smack+0x102/0x330 [ 367.535471] ? smack_sb_alloc_security+0x170/0x170 [ 367.540418] ? lock_downgrade+0x910/0x910 [ 367.544575] ? kasan_check_read+0x11/0x20 [ 367.548735] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 367.554026] smack_cred_prepare+0xe6/0x8f0 [ 367.558300] ? prepare_creds+0xa4/0x4e0 [ 367.562295] ? smack_cred_alloc_blank+0x80/0x80 [ 367.566975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.572518] ? refcount_inc_not_zero_checked+0x1d9/0x2e0 [ 367.577972] ? refcount_add_not_zero_checked+0x330/0x330 [ 367.583437] ? prepare_creds+0xa4/0x4e0 [ 367.587429] ? prepare_creds+0xa4/0x4e0 [ 367.591429] security_prepare_creds+0x7d/0xc0 [ 367.595938] prepare_creds+0x3c4/0x4e0 [ 367.599827] ? abort_creds+0x290/0x290 [ 367.603719] ? copy_process+0xb3c/0x8710 [ 367.607793] ? trace_hardirqs_off_caller+0x300/0x300 [ 367.612908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 367.618451] ? check_preemption_disabled+0x48/0x290 [ 367.623488] copy_creds+0x7b/0x5e0 [ 367.627044] copy_process+0x1120/0x8710 [ 367.631036] ? __lock_acquire+0x572/0x4a30 [ 367.635297] ? process_measurement+0x268/0x1be0 [ 367.639972] ? print_usage_bug+0xd0/0xd0 [ 367.644038] ? __lock_acquire+0x572/0x4a30 [ 367.648316] ? __cleanup_sighand+0x70/0x70 [ 367.652564] ? __lock_acquire+0x572/0x4a30 [ 367.656817] ? mark_held_locks+0x100/0x100 [ 367.661077] ? __might_fault+0x12b/0x1e0 [ 367.665145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.670688] ? _parse_integer+0x139/0x190 [ 367.674843] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 367.680392] ? _kstrtoull+0x17d/0x250 [ 367.684213] ? add_lock_to_list.isra.0+0x450/0x450 [ 367.689136] ? lock_downgrade+0x910/0x910 [ 367.693300] ? add_lock_to_list.isra.0+0x450/0x450 [ 367.698247] ? __check_object_size+0xa3/0x790 [ 367.702774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.708307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.714284] ? check_preemption_disabled+0x48/0x290 [ 367.719311] ? get_pid_task+0xd4/0x190 [ 367.723212] ? find_held_lock+0x35/0x120 [ 367.727293] ? get_pid_task+0xd4/0x190 [ 367.731197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.736742] ? add_lock_to_list.isra.0+0x450/0x450 [ 367.741672] ? kasan_check_read+0x11/0x20 [ 367.745823] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 367.751115] ? rcu_read_unlock_special+0x380/0x380 [ 367.756065] ? __f_unlock_pos+0x19/0x20 [ 367.760042] ? find_held_lock+0x35/0x120 [ 367.764132] ? __f_unlock_pos+0x19/0x20 [ 367.768125] ? proc_fail_nth_write+0xa0/0x220 [ 367.772631] ? lock_downgrade+0x910/0x910 [ 367.776805] ? vfs_write+0x2f0/0x580 [ 367.780539] ? kasan_check_write+0x14/0x20 [ 367.784783] ? __mutex_unlock_slowpath+0x195/0x870 [ 367.789736] _do_fork+0x1a9/0x1170 [ 367.793290] ? fork_idle+0x1d0/0x1d0 [ 367.797015] ? __sb_end_write+0xd9/0x110 [ 367.801099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 367.806641] ? fput+0x128/0x1a0 [ 367.809928] ? do_syscall_64+0x8c/0x800 [ 367.813904] ? do_syscall_64+0x8c/0x800 [ 367.817886] ? lockdep_hardirqs_on+0x415/0x5d0 [ 367.822472] ? trace_hardirqs_on+0xbd/0x310 [ 367.826795] ? __ia32_sys_read+0xb0/0xb0 [ 367.830861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.836227] ? trace_hardirqs_off_caller+0x300/0x300 [ 367.841342] __x64_sys_clone+0xbf/0x150 [ 367.845325] do_syscall_64+0x1a3/0x800 [ 367.849226] ? syscall_return_slowpath+0x5f0/0x5f0 [ 367.854162] ? prepare_exit_to_usermode+0x232/0x3b0 [ 367.859184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.864041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.869282] RIP: 0033:0x457ec9 17:06:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x6, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000800000000001900007700000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:06:49 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x5460, &(0x7f0000000000)) [ 367.872477] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.891393] RSP: 002b:00007fcbe072fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 367.899112] RAX: ffffffffffffffda RBX: 00007fcbe072fc90 RCX: 0000000000457ec9 [ 367.906395] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000802122001ffc [ 367.913680] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 367.920951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbe07306d4 [ 367.928218] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000003 17:06:49 executing program 4 (fault-call:0 fault-nth:4): clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00Am\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000002bc5dfe410128e6c36a5000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x8800) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x40, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x3}}, {@cache_loose='cache=loose'}, {@access_any='access=any'}, {@msize={'msize', 0x3d, 0x3}}, {@access_user='access=user'}, {@afid={'afid', 0x3d, 0x7f}}, {@cache_loose='cache=loose'}, {@debug={'debug', 0x3d, 0x4}}, {@version_L='version=9p2000.L'}], [{@dont_measure='dont_measure'}, {@subj_type={'subj_type', 0x3d, './cgroup\x00'}}]}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000600)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x16, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@jmp={0x5, 0x3, 0x9, 0x5, 0x8, 0xffffffffffffffe2, 0x1}, @jmp={0x5, 0x6, 0x7, 0xb, 0x8, 0x10, 0x4}]}, &(0x7f00000004c0)='syzkaller\x00', 0x7, 0x58, &(0x7f0000000500)=""/88, 0x41f00, 0x1, [], r3, 0x3}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r1, 0xd}, 0x10) fsetxattr$security_smack_entry(r0, &(0x7f0000000740)='security.SMACK64MMAP\x00', &(0x7f00000005c0)=':\x00', 0x3f, 0x1) syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0x100000001, 0x400000) 17:06:49 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8901, &(0x7f0000000000)) 17:06:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x7, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 368.206140] FAULT_INJECTION: forcing a failure. [ 368.206140] name failslab, interval 1, probability 0, space 0, times 0 [ 368.219888] CPU: 1 PID: 14503 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 368.227099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.236457] Call Trace: [ 368.239078] dump_stack+0x1db/0x2d0 [ 368.242731] ? dump_stack_print_info.cold+0x20/0x20 [ 368.247765] ? smack_cred_prepare+0x480/0x8f0 [ 368.252280] ? prepare_creds+0xa4/0x4e0 [ 368.256285] should_fail.cold+0xa/0x15 [ 368.260189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 368.265314] ? ___might_sleep+0x1e7/0x310 [ 368.269472] ? arch_local_save_flags+0x50/0x50 [ 368.274082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.279650] ? selinux_is_enabled+0x43/0x60 [ 368.283983] ? creds_are_invalid+0x125/0x150 [ 368.288413] __should_failslab+0x121/0x190 [ 368.292697] should_failslab+0x9/0x14 [ 368.296505] kmem_cache_alloc+0x2be/0x710 [ 368.300669] ? check_preemption_disabled+0x48/0x290 [ 368.305694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.311238] ? selinux_is_enabled+0x43/0x60 [ 368.315567] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 368.321138] ? creds_are_invalid+0x125/0x150 [ 368.325624] __delayacct_tsk_init+0x20/0x80 [ 368.329960] copy_process+0x40ac/0x8710 [ 368.333944] ? __lock_acquire+0x572/0x4a30 [ 368.338186] ? process_measurement+0x268/0x1be0 [ 368.342860] ? print_usage_bug+0xd0/0xd0 [ 368.346929] ? __lock_acquire+0x572/0x4a30 [ 368.351199] ? __cleanup_sighand+0x70/0x70 [ 368.355452] ? __lock_acquire+0x572/0x4a30 [ 368.359722] ? mark_held_locks+0x100/0x100 [ 368.364011] ? __might_fault+0x12b/0x1e0 [ 368.368108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.373653] ? _parse_integer+0x139/0x190 [ 368.377824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 368.383363] ? _kstrtoull+0x17d/0x250 [ 368.387171] ? add_lock_to_list.isra.0+0x450/0x450 [ 368.392100] ? lock_downgrade+0x910/0x910 [ 368.396255] ? add_lock_to_list.isra.0+0x450/0x450 [ 368.401189] ? __check_object_size+0xa3/0x790 [ 368.405686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.411272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.416820] ? check_preemption_disabled+0x48/0x290 [ 368.421874] ? get_pid_task+0xd4/0x190 [ 368.425768] ? find_held_lock+0x35/0x120 [ 368.429836] ? get_pid_task+0xd4/0x190 [ 368.433728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.439273] ? add_lock_to_list.isra.0+0x450/0x450 [ 368.444204] ? kasan_check_read+0x11/0x20 [ 368.448355] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 368.453635] ? rcu_read_unlock_special+0x380/0x380 [ 368.458584] ? __f_unlock_pos+0x19/0x20 [ 368.462573] ? find_held_lock+0x35/0x120 [ 368.466648] ? __f_unlock_pos+0x19/0x20 [ 368.470636] ? proc_fail_nth_write+0xa0/0x220 [ 368.475142] ? lock_downgrade+0x910/0x910 [ 368.479299] ? vfs_write+0x2f0/0x580 [ 368.483038] ? kasan_check_write+0x14/0x20 [ 368.487285] ? __mutex_unlock_slowpath+0x195/0x870 [ 368.492226] _do_fork+0x1a9/0x1170 [ 368.495791] ? fork_idle+0x1d0/0x1d0 [ 368.499513] ? __sb_end_write+0xd9/0x110 [ 368.503587] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 368.509129] ? fput+0x128/0x1a0 [ 368.512412] ? do_syscall_64+0x8c/0x800 [ 368.516391] ? do_syscall_64+0x8c/0x800 [ 368.520365] ? lockdep_hardirqs_on+0x415/0x5d0 [ 368.524953] ? trace_hardirqs_on+0xbd/0x310 [ 368.529274] ? __ia32_sys_read+0xb0/0xb0 [ 368.533338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.538712] ? trace_hardirqs_off_caller+0x300/0x300 [ 368.543826] __x64_sys_clone+0xbf/0x150 [ 368.547811] do_syscall_64+0x1a3/0x800 [ 368.551706] ? syscall_return_slowpath+0x5f0/0x5f0 [ 368.556642] ? prepare_exit_to_usermode+0x232/0x3b0 [ 368.561680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.566548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.571755] RIP: 0033:0x457ec9 [ 368.574949] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 368.593859] RSP: 002b:00007fcbe072fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 368.601586] RAX: ffffffffffffffda RBX: 00007fcbe072fc90 RCX: 0000000000457ec9 [ 368.608868] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000802122001ffc [ 368.616145] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 368.623451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbe07306d4 [ 368.630743] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000003 17:06:50 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8902, &(0x7f0000000000)) 17:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x800, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x4, 0xf, 0x7, 0xb, 0xfffffffffffffff0, 0xfffffffffffffff0}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfffffffffffffebe, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0xa, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:50 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00t\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0xb, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:50 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8903, &(0x7f0000000000)) 17:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x6, 0x202) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x12) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bind$netlink(r1, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbfe, 0x80000}, 0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b400000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00z\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:50 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8904, &(0x7f0000000000)) 17:06:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0xc, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = open(&(0x7f0000000080)='./file0\x00', 0x1, 0x8) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="020013000000000029bdac3f0000000005000600322000000a004e23f12f3911f93769f7503cdc238adf5186ca94d9ed36649f04000002ff010000000000000000000000000001800000000000000005001a00ac141410000000000000000000000000000000000000000000000000000000000000000000"], 0x70}}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:50 executing program 4: clone(0x802122001f11, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\xc0\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:50 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8906, &(0x7f0000000000)) 17:06:50 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x440800, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) 17:06:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x0, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0xd, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000001c0)=0xfffffffffffffffa, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000400e641226532e32c600000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x55d7, 0x208000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x9, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x02\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:51 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8907, &(0x7f0000000000)) 17:06:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0xe, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:51 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) 17:06:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x1, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000180)=""/181, &(0x7f00000002c0)=0xb5) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000001f0000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x2}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:06:51 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x890b, &(0x7f0000000000)) 17:06:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x04\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:51 executing program 4: clone(0x50104000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101000, 0x0) 17:06:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:51 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x890c, &(0x7f0000000000)) 17:06:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\'\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x10, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 370.132116] IPVS: ftp: loaded support on port[0] = 21 17:06:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 17:06:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0xfffffffffffffd21) 17:06:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00/\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:51 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8918, &(0x7f0000000000)) 17:06:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x11, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) [ 370.848849] IPVS: ftp: loaded support on port[0] = 21 17:06:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00H\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:52 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8936, &(0x7f0000000000)) 17:06:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x12, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000002000000000000000000009500000000a17100"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x1}, 0x10) 17:06:52 executing program 4: mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rootfs\x00', 0x0, &(0x7f0000000100)='\x00') clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x0, 0xc0000000, 0x1, 0xffffffff, 0x9, 0xfff, 0x5f438778}) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x6) 17:06:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd}, 0x10) 17:06:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x13, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:52 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8940, &(0x7f0000000000)) 17:06:52 executing program 4: clone(0x84000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00L\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00L\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:52 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8941, &(0x7f0000000000)) 17:06:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0}, 0x10) 17:06:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x2, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00h\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x15, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:53 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x894c, &(0x7f0000000000)) 17:06:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00H\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:53 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x5) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x440, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000040)={0x20, {{0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x1}}, {{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x1f}, 0xf4}}}, 0x108) 17:06:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00l\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x2}, 0x10) 17:06:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:53 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8980, &(0x7f0000000000)) 17:06:53 executing program 4: clone(0x8041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000001040), &(0x7f0000001080)=0xc) r1 = socket$netlink(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001440)=[{{&(0x7f0000001100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001180)=""/57, 0x39}, {&(0x7f00000011c0)=""/169, 0xa9}, {&(0x7f0000001280)=""/197, 0xc5}], 0x3, &(0x7f00000013c0)=""/110, 0x6e}, 0x1}], 0x1, 0x20, &(0x7f0000001480)) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 17:06:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x11}, 0x10) 17:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:53 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8981, &(0x7f0000000000)) 17:06:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00t\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:53 executing program 3 (fault-call:2 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x70) 17:06:53 executing program 0 (fault-call:3 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:53 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8982, &(0x7f0000000000)) 17:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00z\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:54 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x12500, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xf528) 17:06:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x20000050) 17:06:54 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8983, &(0x7f0000000000)) 17:06:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x2, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\xc0\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200)=0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) setgroups(0x3, &(0x7f0000000380)=[r1, r2, r3]) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x2, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:54 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x89a0, &(0x7f0000000000)) 17:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00 \xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x4, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10880, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x7, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:54 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x89a1, &(0x7f0000000000)) 17:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\'\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:54 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000440)) 17:06:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x5, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:54 executing program 1: getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000001c009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfffffffffffffde6, &(0x7f00000003c0)=""/251, 0x40f00, 0x0, [], r0}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:06:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x4, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:54 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x40049409, &(0x7f0000000000)) [ 373.288421] cgroup: fork rejected by pids controller in /syz4 17:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00/\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x6, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:54 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80008018}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6f00000003700845702c7543137b039bd1a2896cdd58df2bdf3012815b082e045f14220acbe05853d89463245f61e4ae795665f5f52add35db88e7e3fa0064736b9fa7277e4d902ec3575e47ee5dc803603aff02a1ebe38b1c5809", @ANYRES16=r1, @ANYBLOB="000126bd7000fddbdf25060000000400010008000600060000001c000200080007000000c0ff0800080000000000080005000002000008000500020000000800040025000000"], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000001) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa8, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x180}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd959}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffb}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x48010) 17:06:55 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000180)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0xef63, @dev={0xfe, 0x80, [], 0x11}, 0xffff}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e21, 0x9, @rand_addr="67b6d5a8691469655eeed981aa9798a1", 0x8}, @in6={0xa, 0x4e22, 0x8, @rand_addr="5ba1ecc04edd2bb73243dda2eda4ef48", 0x3}], 0x94) 17:06:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x5, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:55 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x4020940d, &(0x7f0000000000)) 17:06:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x7, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00mA\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:55 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 17:06:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800c2ecc645853f8de3819d46caaaefd666e3d237efaaeb61000000655aba0000eb000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x886, 0x204000) ioctl$void(r0, 0xc0045878) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000080)={0x80, 0x5, 0x100000000, 0x3, 0x5, 0x4}) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000000c0)={0xc, 0x0, 0x0, {0x20, 0x36, 0x20, 0x6}}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x1}, 0x10) 17:06:55 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0xc0045878, &(0x7f0000000000)) 17:06:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x6, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00H\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:55 executing program 4: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x121000, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) 17:06:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x7, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0xa, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x100000001, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffff9c}) getsockopt$ax25_int(r1, 0x101, 0xe, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0xfffffffffffff001, 0x8}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r3, 0x4}, &(0x7f00000001c0)=0x8) 17:06:55 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0xc0045878, &(0x7f0000000000)) 17:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00L\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 374.032297] QAT: Invalid ioctl 17:06:55 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x200cc0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000200)={0x400003, 0xffffffffffffff98, 0xfffffffffffffffe}) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x802b, 0x3}) sendmsg(r1, &(0x7f00000018c0)={&(0x7f00000003c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(generic-gcm-aesni)\x00'}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000440)="7b4123b85816acbce6ed8d76480acffef7a35b55f9cb88941f1db20c0c74317879fc14d2e9d9667e864251bfecd627ae724e98c03b6a9dd8334d03f09d7778dfb5e0bc94d66012774e497f75bd6588da", 0x50}, {&(0x7f00000004c0)="67fddfa643a4eb24c43d9567dcf3b858cce9690bed115038cfd0a50b1dd0e1021bd51fef", 0x24}, {&(0x7f0000000500)="f14ee5a8aeccd6168cfbe3620c71e94ab863515bff98fa7e18f8220c5ee6efe1b3f426bf8a1fbcc61f1816ac67a05cf6ed7efbf36584e28ace2454ee189e13016d956fddde153053416a261c32964de92b85e19bf492b5b068eb53", 0x5b}, {&(0x7f0000000580)="3e5f022dbf4b3c4c9246b508fcc1db6c8457bbbe6d8af125c5ea09831b3ab9b44c49a96b7e36722e16e1f90c354d160e0a33d9f4ab08f098cde25b24392f261c1eb76d359e65d2ef41037a81cf258260e04a15e5cef381c0ae4d72c8d9b0391acc3a71d644146d02c7034fd2ffd2ef31b2be6f98d308e7353732251e6e9e51e11dec1b214915dac5dd", 0x89}], 0x4, &(0x7f0000000680)=[{0x1010, 0x102, 0x3f, "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"}, {0x28, 0x13a, 0x7f, "85221c8a2b99c3a8a87d2e5e50634cd60f3eb4"}, {0x50, 0x115, 0x1, "a652ab48545427841befdbb6e13647b19209a6e03c14b390a4312bbeff38d726b35b17b80e6b56d4b5b2b979b21fa8a35d282b7e8259533661"}, {0x50, 0x100, 0x4, "c0a4a74ae8544f6af7fc8b6b95f150319556a1ea81cdf80fae1fe762f20eb1adb260d4ec8b1d6f5c0f487cf213beabbb9e05796c69cfdbb702962ddce6"}, {0x68, 0x10d, 0x1fdb03d5, "fe687ca4a745e2d031cdb1905907b7347bcb54cd8831a09197d9c7ccdef5bbbf0f539ccba2a7efd3645e3de68645e39b0dfe780b1615883e8b694be72d101e252d7f168026a47616580dc3861989bf5d12218f92bfc3"}, {0x100, 0x101, 0x1, "5a1d6f1d14fbbf27e555ca4bc49bb83c68720775c3456ac150e63646410f53385e3a54119c41ec6b68735dc0b09f4537c4def6f34ee55cec2d0890b854e5d69fead0a030a4e589c3084827b21aa90a575b6ee9ed83b3f7ad9bb854a339a2c0cecb707ae02c4ddc27c4a207666cb50f826a76a09b313d5cf01dd05180460134db786b3a9c31aa941e6208f91fd6b3280e47ccb0dd81b3cfc3a189e92557188a6f0f09afc688e0d589dd6beb1c57459bda2f6e48ad3d321a91af4bb1ed257f7c9cd7a2415141d2dbd3d13caab9e92729dd2ace6b2a94a4817e05ea0077ff481f85931ed0cdd3b9cc886bc7ba"}], 0x1240}, 0x840) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0x2}, &(0x7f0000000280)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000380)=[{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000}, 0x1c, &(0x7f0000000140)=[{&(0x7f00000000c0)="4462d9c8f1cfa69dd1a1d457753d02ff9765f4a5b35668e6a494203da2be911f14ed255a2295db8170c8573b4477ea4728e65592d1e64b333f457320e164bf61e81bd5db7738f7b92018a8848d2eba74a0949e6ef49e9f3f7c240855c47fddfde68310c6f3fe486485736a5d6f4dc3407ef1b2df78b39a1ecbf2b4b987", 0x7d}], 0x1, &(0x7f00000002c0)=[@init={0x18, 0x84, 0x0, {0x401, 0x3, 0x0, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0xb8c3}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x2, 0x8000, 0x2, 0x2, 0x0, 0x7fff, 0x8000, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x6}}], 0xb0, 0x4044005}], 0x1, 0x805) 17:06:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x802) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0x3ec) 17:06:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0xb, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:55 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 17:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00h\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$LOOP_CLR_FD(r1, 0x4c01) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:55 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0xc020660b, &(0x7f0000000000)) 17:06:55 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) r0 = inotify_init1(0x0) capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5}) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r1, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40101, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000200)={0x0, 0x310, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x1c}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) 17:06:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0xc, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0xa, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00l\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x5, 0x2, 0x10001, 0x4, 0x0, 0x20000000007f}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0xf, 0x3}, 0x10) 17:06:56 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) [ 374.525034] netlink: 'syz-executor4': attribute type 1 has an invalid length. 17:06:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0xd, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0xb, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:56 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:06:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00Am\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:56 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x442200, 0x40) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x0, 0x2, 0x13}, 0x5, 0x10001, 0x4}) 17:06:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200100, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x100, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x10001, 0x1, [@default, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 17:06:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0xe, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0xc, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2040, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000040)={0x6, 0x2, {0x55, 0x8, 0x1ff, {0x7f, 0x1}, {0x7, 0x8}, @cond=[{0x8001, 0xfff, 0x4, 0xa83, 0x80000001, 0xffffffffffff7fff}, {0x1b7c, 0x3, 0x101, 0x1, 0xffffffff, 0x5}]}, {0x53, 0x100000001, 0x8, {0x7ff, 0x100000000}, {0x6, 0x9}, @ramp={0x7fff, 0xffff, {0x9, 0x20000000000000, 0x101, 0x3b0b}}}}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000001140)=0xd504, 0x4) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797a310f146f0cae648abf8edbea83ef64ab5418ef276ca393851b5dd97b34fdba59c7ed0bf069ff18bfc610a83040f85ccbf0825e68c5e4b4412c6bee6d119ef2b1df4f02a9de375c2effb9fa8d2f8192a41a141c9895a6f8fb94758427de91f573eb6198d9d97a2cc79355a45b940c3789261245bde9d9c7fb1718c27be2e746d950ca9654807a77dee0c80fa955f80732587a069b9e16c147bfc96effc68123feed661c388dbff67b44a70e05363578595fe541841b13801910a707bed6c6fa980de744a1dc9e7b51547e3e0afa63dda613e410e197abe8dd255abe62368d4dc2f49d2c13da29ea006d57d62ae5c2b6c08702cf6a4b72453c34f8a8f4dbb7de0e4a007a259472b51eccae6dc2e3e4c34129abf914e70bf7831052acacb757a83034bfdfa979280ba368eb66b979e56e6ee058894056fa68e9f78432e7dc868609aff2432082bdac9288921d418a15542e61f01eca8724134ffcebc5dedac54d6b09d835d9fe0ba330a6909402bb93e2cd26cf0711d80f81df5ca20709f99d6f4cf00fdb1666511ad7cc150c4b72d49fb0862f5d0915f63dc9666581cef68f51cb68bac96b844673d992919663b34d011b236a7fe6c40f1b8741a848cc57636f5c968c17c666408bad0ceb584a1f2653bce53ab4a470b127e8f215e5b35e350ebcf45adfee001e9be6dbaa3f13385853ef3c25c57f5346eb2798d2f2da64e2317f31ba9c9cea31a773d8b8323d44dea56349f1bd41edbdb8eb9526cb4febba3305c8211c4de339c24138c3c2b118a3c268f15b7db14fdebc330a4a23eb3d1fdcc1f299b6d605169389efaa0ea8f30ffdb54729cdcbae7cac2f31df4b6d5f4abffa3e76602b79ecafd2ddd7d548cd3e71a283f9ffa27c9191bf8e800bc80076ecaaba32bf7010f1ce48ef05d34801556960cf4f78a0fa1a924742bb821ee964867e0088d93c4172253d8361f3b04f88346cdf85535f117c41074f16b874f4a9c0ec7dbb435860f0d7afdde504dcd88eed966fdc49009f2d3ba2c6ce673a326500a3867c8e351ee89007b002bf3bab66686636fbf57e05c2665bb049aa06945b574155595d533f4ac12fcea6d82810dc3c9165733fb7af6b4bb81ae07709043e77b24a8d939adf690f0d69d431c5b2c96047ead902b4f8cb16e89cf726f83e6666b7061d6e58db39de298be07408adf4e064c4c20402494a52c881989fe95fd11e48b5c14e623d639f79dd9ea12e51238ce9a5388a47377070bf2489848da0766fa56163a279cb8834faaaf43985ae6fe4cc024473166a78dbc5cc22ecb0ce885f1852126ffb5ea6ad1bd960fd0d333e92e86f1f53606154c122284840cd769df33d45155e516ab5ade897e3197408d776e6bb84cd1c67e2cf3352e4effd7948dbdda64af3b051ba0508b8d21ad90fd11687d3e486a42c5bb1f76d32d0b5cafd31d12000667ac5789cf8ec46ac5d5395777babd44021625ad102d81672308c8039d31d7c3aa5f83b1957a3732a962f57fa5cedff31034c065101234e8790fbc08555a2cac703d294b2f293db0a5f519255a3dccb9cc29ec66076fc7dbbd9ebdf74121e615eee33f0be2b80b3d6e3c80434673a73033c20f64e35a0a8ed8de98528540ac1856e80f9b2a983e63b9d3062de6001df15f15787bb3f44cedf77a58a31d766b91a792dfe01ca70dbcadfbfcc3da74120dd1e770ad6defa24ce5d57f338d05ecf4acc4d10269ef9fd910d0ce73f773645b7dbe2fc743b68a3ab19ebf48130197bf4dd0d352abf38252df153e2a9aa2d1eeaedcbe40247c43af0033d95501610ac21c7165298345960e2203dfe6a1156745f78f6067feb0fa5bba1061382f437ee2ca0123909afe7dcf24bbf7916a9af677cdad234dedf250aae5cfc30fa81d97b344febdc0e0204e28933f76327bb509749ccc638ef623b3de29fbba9d3aafc391edb0d5ff62e1cd5a6cbb62771d9855d190e597ea9d90bf8bcda213fb77ef5cd0de2a62f03b709d16ea05649cd132d0d757d3a97e14ea0aadf7a039719e47d7038f02b36b1461fb9d68d6b85eef5996bbc63c480c683620fc529b0de15f36890821a811783b37d9b531f80e4dcdd08e917813dbdd04b287e8b31837b8da1dbd9be826317f61e30a1285988cfc184748c925f55e8fbf7e125d6fb79b2fafbbc9d19489478ffdba8c1482341d07ebf35630d821cd774c07c992e59be313caf26b4c5ca2da4ef17ce281ac3787cfa3e79040b9382e26d5b94d6d96c939b57bdf3a217ce94d83c96b13fe4bd2e12b8cd655f1f61aa9cd47b34d5985430283447bcb7120e446231dca8e89a353432247e7f3c5b8036de62ce448f06324ceffa8f55c003114972d54c4c368fec311c9ca57d27d05ae9f730270690626a61db9e6fddf4114812ec89742aab09300c583af6af1933d6b78bacaec4db92c16ddf970d56f85aef5482ab473738f28e2ee5464f666bcda211d04c245c6a293ca5a938e79f8e57977bf0665432631bbb9462dc8e81f1cb150a1f563aec0f18cee4b9a7283e8f05bf5d57b36cd2ab0495c8b7593c1c9abb90536b57f900761ea0177aa1dc8f80305a9343766ebe0da63b41fea973f4de90a8c6a2df57ba7a4105b8f9ad14ba6de118c9aca1a681c1c72c4e3c4585dbde90e3b2961f00d1a24321537e28c87a872636b343d02ddc17f6d6539b398bbb1b2f0915c34d40816489a149b7275b6dabdd6dba408d49ab37dac5ac6398aaf6d29ad6452752fb57fb938b1d2c9d7520b277bb36f7f9350990c459ce8897ef0727c0d781014ec5b10c4ac4d9e003362fcef54036adbac9836aa748e9deb91d6b6f07b46efd5bb63ff41214cde6633b1c744e73d1158855f5cb0b7f8672bc66f4150c912f5d3e07fe11dd1e53ae4759ffb9e1f74bbb6676f3c39d8453d2ae4193faf3ca3f23da157b97d5b574ddaac2cd9eb53da7d71ed59554969e84f358aac5a6016e18638f9eec493f2ab7ce9f854db360f3bfbcc110f9e3d4c9d5797e22a04dcc3701c5a483cc57bd41df49380222f426255cb272c8c219c585f2d13e5e2c8709430d28034cc60a70b4088f4b5f4081e55dad04da1c689b28011e44f6a05f793f6050289c212085a36e6003208c4c0ea02eae82be033b3bb8c19dd5fa03d4401322570a732e0aa2e4f48103cf53a619350539b2ddf7ad4c427ff7fe5e82738b4f2b1f997cff588a9df338e36d0edd6e815127444aa8eccee044316a8be163ecce376b023c8fe658356c5b25e19a5b065e1e7db9d269b20742ea778da4f77332909983f8692a5186850a64ebe0053aedea484ceb6a124e6e25039aba2d102e9a41c60ef4fb7b3fbe913b47bcdaf7381d3e7c5e7fb7c1010705d38c935d217619c96b1316f7ae1f12b1b8837ca1bcb2a60d2a8eb431762fd0ed85f83985559dde857990b4ac723ee0b9ddff94aecdde5ce29c878396c15a6d46b1b3b203403dd029ab008d5c9597aaa0e0fbcb58b10d4191090cf2cf1ee3e8b2f1aba689fb6addf153c5ce838fa57e5d0c40c69e748afb76c76528374f4501783790bb8e8b6fd6224ac887f25f5c36ed8b361e59cc2d51f9096bade32736324f4956d18e63e07844c678793fa2a37f59fe71cfe0ac94daa8052f6538461faab103f4f314e8c11bdddf20cc7e8376fccc1cca7ac4d3c56872c7473dc1ed95f9ce6fe81d094b7541a15846a8a1aa066183f3e9fef649847c0e13db9649f1464b3e17ad0323cf0d45af6dda9d86b6d3df265881d4ed5ddb58101426798cea71bc97048b32be34b6a5704d4d69caad0d04866163a2fb53f4521b2d51af8941c6d47e3ed0573e7473e0cafa001622820b9998fd80523750f39ec4e968c19d55786b74765979edf9feda7893ceb0759b75a029913be4a9abf091024e06379645a96b0450dd7e25cafc943f84ef6875fe5ab5b681c7db1bcf0d5534cf4fa3a35bfb84370ccf2dbfb9456db1493208cf03addaa1b04d765dda7281a7f249377c7bde5c41f7d46bd2b5eca7fd000fa29343e8049f3307c446bb01f7211791fec32cd0b87bc31a29fc375e14949160c33c1a7732ec0652562ce7baf792c99d91518e78e7a6b45e74e0593652b4791517252f497cb7993d8e9e7ed56b632d27ac0639bd15ca9ee525cb608f6bf1930d8fa4de71f7c7fbf06b38f822a0eebd38b87b181b3207211c90b329ed35192a214c2ac9005710c5fbaa4f7792b15d287ab8d8248a106d2490de74ad69bc09d7ff5f6fbc682923f7f3fa35a0a00b0407470027a46c632522cac1394689750b9302b2aad425624803e48c4b0327df30c608852acf6ba0676933ca1b599f3601345cab393a069b6432d727decdfad776bd3b0226b2ec5fcb4c57d672c8b863d56cc0cdc622f93c6881be72e05db1636f622847f2d844613c2fee954fb6912342ea9e845d2062be43b2e274f62a88581e003e43eb734cc77c43d8e1ba0d5ffebe0b42dd33f50ed2e517843e207434df57e4de4e5e45d9fa80ab8c52775f9ab24a84f9a6307c358a319418a9f990c9023338d0cf7d3ad73f66b019fab7ae3ac4f93465da62827a9f26f11f12da37a6fb48f5c06a3d71143e6fbdc91e795dbc411f37c6006eab03b169eef87d3b4f0579d130518c4ae179ff2eaf2ab12feb451158527112ad34a9f2c589c4c6142d99a5a25c428bf471a9a4a1195b2300bfe3f1da31dc2b083669049ee7bc6a1b0ff8642069f5f901b1a67a12beacc521dca7726b456eb19d9c5216f0073000816259bbb1dca457126f8efd8c4600e33dddf1f0e85ecb9d464d8efae2040a0a645c0cc5f3918e42e058a49aca13dfa12d3c9839a150080d47984ded77c9ba35bb2c8f06f10742bf5811514fcaba8356f40d1c31df678771914649782d876fd30d7957bbc9dc82bdd20035b14d4cbd15e158a45d9493fc0de9f46cc446b90645e171a5cd8d97c5b769da6920548466006b118a5a755e0de69986edcbd8ad4c679c4ec8206e47e3cc392cc1cd4f4e13c3decabaf70cdec0f66bbbd841fa1f1b62aa528c34ce910aed2bc967b013e11a78ef0162b2cfc4a86c54f4c9b96a9cc3ab9b9270401a54e9b44f9346d628030000000000000020c864b669dbca7205b9e165c1e8ac7ab34596560a007838bbc869470bd8644eb48e4f2c38d2d70171d24be764bc22b7f1e4f66db2eef56315ce266404930dfa4f3cc77de6f409cda23bbd6e28130ef7dd522ec033f7193acf9f2cfe74906573b2d409e2514dbad1882d64b4a5718b9407af794ad5a786a71c1dbf8a9e9c99a56861e0dd35bf79642fc0b34069b0c25ed3d6e78136bbe9071e9ac053417063d8d074f9ac77ad4e38d8c38774a0f0e23e53ac6b2b73816e7764ffc4c7360113a567ed13496fb6f36268f80d54a8cdee30ddae3d3043fa3ff11419d210e5168669346c6d6fa5688ea233f4f5af95fdaba7902ee5de6833387734ba3d0858d39077e15457605345afc521ac017f1dfe9d328dad124530680a799cb7e9cdabd241ffebc5f2cafffcc501fd81dc96e0b07bc0903f82c0d6dd73f05d94d30bca569653931ced2cd7b68cdd1f7fea365c69b376ef493e79236006c779675c9a169b7f53668ef0cb1249e8206acf218f572f42411709e778704fda00d16c6a41a69659ea60a5f5c7d8d08a8ab227821c9664902b33aa413881d0898c43d1eeefd8a3521366e11e80ce2333b2c15456ede247626a1b8fcc0bfdc77709bc2fb79490d2cf4ac5c53eb175ebaef5e7370c3d1ff1cbf02725c0137e21033f1f7ed965f80561812ceb97319d0741f8f75afa44b5b2"], 0x1004) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000001100)={0x0, r0, 0x8, 0xffffffffffff0001, 0x988, 0x15}) 17:06:56 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00', 0x1}, 0x37a) setsockopt$inet6_opts(r0, 0x29, 0x800036, &(0x7f0000000080)=ANY=[@ANYBLOB="84080404e020ff0ffe8000000000000000000000000000bbfe800000000000000000000000000023fe80000000000000000000000000001900000000000000000000ffffac1614aa"], 0x48) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000380)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f00000003c0)=0x10) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000100)=0x6, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000400)={0xe11, 0x6, 0x3, 0x84, 0x0}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000480)={r1, 0x9}, &(0x7f00000004c0)=0x8) rt_sigaction(0xb, &(0x7f00000001c0)={&(0x7f0000000140)="c422593cc9c4c27d2a16c441fff046f9c46290f30b470f0d00c481d75ed9c461f82bb47100000000a5c40365498a04020000930f0de6", {0x4}, 0x80000004, &(0x7f0000000180)="44aaf2660f18c1430f01d76736420f0d57d30f94b400b8befffff3420f5e83000000204692c4e1b9e259000f2a3b2e660fe58d04bd6f65"}, &(0x7f00000002c0)={&(0x7f0000000200)="65dbe2c4e2b19ed2c442a1de530a363ed2ae99899999f23665c197afa206d778f3460f5ce7c4411f59e3c4c239393db400000066410fe75200c4a2499b07", {}, 0x0, &(0x7f0000000240)="c4622d3d85ffefffff66410f6721c443f909599eddc48279184e65f2f3f00fab9500100002c422d1972166640f0f57008a3e66440f296006c4414e10fe8fe97883c9"}, 0x8, &(0x7f0000000300)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x38, 0xfffffffffffffd57) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000340)=0x8, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x10001, 0x40) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000540)=""/4) 17:06:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000040000000000000000000000000003ca0996b890c11d539cb9baf7ff7aab60f3ad4c970b6fa310d0223252f6ea3aad9535ec61f2f84142c64934f7b0ae3d364e60c6cf0aef72a33b43a09cc24b76b0500003b6e46c6f4"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00t\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:56 executing program 4: clone(0x1800fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x90) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000040)) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x8, 0x2, 0x100000000, 0x0, 0x40, 0x356}, 0x1c) 17:06:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0xd, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000217aa3a700010000000000000000000400000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:56 executing program 5: r0 = socket(0x4, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'ip6gr\xc8\x0e\x00', 0x1}, 0xb6) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'vcan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:06:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x10, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00z\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:56 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x10000) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x7, 0x9, {0x57, 0xf34, 0x7, {0x0, 0x7}, {0x7fffffff, 0xe2}, @cond=[{0x9, 0x1ff, 0x2, 0x8000000000000000, 0xf183}, {0x1f, 0x4, 0x10000, 0x8, 0xffff, 0x1}]}, {0x53, 0x4, 0xc6, {0x40000000, 0x1}, {0xffff, 0x1b0aedcb}, @cond=[{0x8, 0x1, 0x40, 0x401, 0x2, 0x4}, {0x5, 0x4, 0x1000, 0x7d2, 0x7, 0x8}]}}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x21, 0x3, 0x71}, 0x2c) 17:06:57 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) setns(r0, 0x12000000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000002c0)=""/165, &(0x7f0000000200)=0xa5) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f00000001c0)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x56}) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18c1f508ce064075dc1a000070eec7254200009500000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc0b4310842e10912, 0x0) accept4$alg(r2, 0x0, 0x0, 0x80000) write$nbd(r2, &(0x7f00000004c0)={0x67446698, 0x0, 0x4, 0x1, 0x4, "13eadd45995643ae0fee7bc438a00c99649995eab108338084f38181570f2c70ff1d02bb1e063eb44537b0617db321718e28e799a1d266dac3fe60cadbf26566f320e0e8c78b82ff89a2c4ffd4e7ab58d42ed523a10671fb644c156cdaec451a798005117bf5152e1ec4e9f5fc3cf19f0debe98684a4021845ae2cc06b378cc0c75ca8d53a8b6fb8a97339124812683826fa90e846e79fe8fabfbf587be8cc21060a5f86b906fc293285e41c62e10fa23998cd8e4bd894436b45188b466acf9ef7ea7e16e2d7ac7e9c7672ba5016e1375ad46b321dac69ee5fccd79ab8cad73be73fa98de4cff63d6da634a4491f55781037dbb27f458241cd8912afe27671"}, 0x10f) 17:06:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0xe, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x11, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\xc0\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:06:57 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'vlan0\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) 17:06:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) 17:06:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x12, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:06:57 executing program 5: r0 = socket(0xa, 0x809, 0x9) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4b0, 0x200000) write$uinput_user_dev(r1, &(0x7f0000000140)={'syz1\x00', {0x9, 0x7, 0x3, 0xdb37}, 0x6, [0x3, 0x81, 0x2, 0x30, 0x5, 0x3, 0xe0b, 0xffffffff, 0xd54, 0x2, 0x7, 0x1, 0x1, 0x9, 0xfffffffffffffffa, 0xbf9, 0x1, 0x7, 0x4, 0x2, 0x400, 0x5, 0xff, 0x9, 0x94, 0x200, 0x34600000000, 0xc6b, 0x5, 0x6, 0x80000000, 0x6, 0xfffffffffffffff8, 0x5, 0x94aa, 0x8, 0x2, 0x2, 0x1000, 0x10001, 0x3, 0x10001, 0x1, 0x4b4, 0x4, 0x80, 0x8, 0x2, 0x0, 0x10001, 0x8ccb, 0xecc, 0x7fff, 0x200, 0x16d, 0x2, 0x9, 0x8, 0x1000, 0x9, 0x1, 0x2, 0x75, 0x6], [0x0, 0x3, 0x8001, 0x2, 0x1, 0x1, 0x7, 0x9, 0xc000, 0x200, 0x5, 0x5, 0x1b7e00, 0x9, 0xc34, 0x800, 0x7, 0x1, 0x8000, 0x6, 0x100000001, 0x9, 0x2, 0xffff, 0x6, 0x125, 0x4, 0xdf7, 0x20, 0x403e, 0x27, 0x1, 0x100000000, 0x9, 0x5, 0x6, 0x4, 0x9, 0x100000001, 0x20, 0xfffffffffffffff8, 0x400, 0xfffffffffffffff7, 0x1, 0x70, 0x3ecc, 0x1, 0x8, 0x400, 0x5, 0xa6, 0x0, 0x81, 0x5, 0xffff, 0x401, 0x39, 0xa7, 0x7, 0x1ff, 0x4, 0x400, 0x1], [0x2, 0x80000000, 0x4, 0x4, 0x5, 0x0, 0x100000001, 0x255f, 0x800, 0x1560000000000000, 0xffffffffffff8001, 0x7fff, 0x6, 0x7, 0x3, 0x2, 0xfffffffffffffff7, 0x9, 0x80, 0x1c7, 0x2cd83c50, 0x101, 0x6, 0x40, 0x3140, 0x6, 0x1bfd, 0x2, 0xdb56, 0x3f, 0x9, 0x80000001, 0xaf6, 0x8, 0xff, 0x0, 0xffffffff7fffffff, 0x0, 0x3, 0x4, 0x9, 0x0, 0x0, 0x8, 0xfffffffffffffff8, 0x3, 0x70, 0x1f, 0x6, 0x5, 0x8b51, 0x1, 0x40, 0xfff, 0x539, 0x200, 0x5d, 0x81, 0x0, 0x7, 0x8, 0x0, 0x6, 0x5], [0x7, 0x3, 0x2aeb, 0x3f, 0x7, 0x7f, 0x5, 0x5, 0x5, 0x1ff, 0x5, 0x6, 0x6, 0x5504, 0x2, 0x100000001, 0x17d, 0x8, 0x305, 0x384, 0xfffffffffffffffd, 0xdb, 0x6, 0x1ff, 0xffffffff, 0x8, 0x5, 0x200, 0x5, 0x100, 0xd6, 0x4, 0x2, 0x3, 0x1f, 0x1000, 0x91, 0x53, 0x6, 0x0, 0x9, 0x2, 0x80, 0x4, 0xff, 0x7, 0x6, 0x8, 0x8, 0x5, 0x1000, 0x1, 0x7, 0x6, 0x20, 0x0, 0x4, 0x3f, 0x5, 0x0, 0xffff, 0x1000, 0x6]}, 0x45c) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000100)={0x3, 0x73, &(0x7f0000000080)="f718d1598c63b07e769b1d63b9a68baedd16e260e8fe0cdf25a3491a5aa13938860374b4784a56958e797e05a0d5d2843adba8d4d126ddd6695675caddf0c75d5848e0ce1b7c256d18a445534566a086e596ed6d2aac31d19a23d3ac1c3dd66d62c7cf92d6c3fd23d68d471d1e557f95187cb2"}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0xfffffffffffffffe, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:06:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:06:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18004cd836803d5fe9786bdeece275"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:06:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x13, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:00 executing program 4: 17:07:00 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) ioctl(r0, 0x8916, &(0x7f0000000000)) write$P9_RWSTAT(r1, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000140)={0x3ff, 0x2, 0x3, 0x5, 0x6, 0x5, 0xfa56, 0x1, 0x4, 0x7ff}) 17:07:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x10, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x30000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r0, 0x2, 0x3}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x14, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x02\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:00 executing program 5: r0 = socket(0x19, 0xfffffffe, 0xfffffffffffffffd) sendfile(r0, r0, &(0x7f0000000040), 0x1ba5) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1200000000000, 0x230000) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000000c0)={0x4, 0x80}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) sendfile(r0, r0, &(0x7f0000000100), 0xff) 17:07:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 17:07:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x15, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x11, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x04\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000060000000800000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/snapshot\x00', 0x40200, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000b00)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast}) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000000)=0x1f6081eb, 0xfffffffffffffff1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0xcb, "3a9b5f658a20d356e2b2d33198c109c7e6ab1878cc8e8b6001f7b1bdfd616fc3df810f80e9a6cf33feb7664c4b01ed457d8d5e05dc9cee217e84f87c06d3e42c6ab8d855cecf8cd7877715f78d1db9b303201a67606b6424757df80c24934e4e461aed903c731ecf46596643d21510101b5aadb6a25c36a009e99798ddb38eac614fdd03bbd754453517a1aa49382a9977617222fb937fa140e5ca36cd93bd287ba890e0624b942cc779ef11cabad3db33684fef7d514bb7789db4de7ed5caeea92be1a03557ef85e20ccb"}, &(0x7f0000000080)=0xd3) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e20, 0x4, @empty, 0x4}}}, 0x84) 17:07:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x11}, 0x10) [ 379.037405] IPVS: ftp: loaded support on port[0] = 21 [ 379.206180] chnl_net:caif_netlink_parms(): no params data found [ 379.247217] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.253633] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.260856] device bridge_slave_0 entered promiscuous mode [ 379.267914] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.274416] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.281427] device bridge_slave_1 entered promiscuous mode [ 379.298869] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 379.308247] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 379.323724] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 379.331246] team0: Port device team_slave_0 added [ 379.336753] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 379.344069] team0: Port device team_slave_1 added [ 379.349493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 379.356987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 379.436919] device hsr_slave_0 entered promiscuous mode [ 379.474087] device hsr_slave_1 entered promiscuous mode [ 379.524728] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 379.807559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 379.821705] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 379.996841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.005509] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 380.013498] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 380.020828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 380.028476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 380.038259] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 380.044648] 8021q: adding VLAN 0 to HW filter on device team0 [ 380.181801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 380.188937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 380.196873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.204703] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.211027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.218379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 380.373003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 380.383468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.391780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.399769] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.406187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.415734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 380.572321] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 380.579726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 380.587893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 380.601039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 380.753575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 380.761373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 380.769892] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 380.780387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 380.787510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 380.796095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.951987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 380.959042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 380.967262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.976715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 380.984142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 380.991756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.140458] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 381.147759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 381.165795] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 381.175888] 8021q: adding VLAN 0 to HW filter on device batadv0 17:07:02 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000001300)='/dev/midi#\x00', 0x3ff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000001340)={0x9, 0x6, 0x93, 0x80000001, 0x2, 0x1}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0x2, {0x9, 0x807, 0x1, 0x6}, {0x2, 0x6, 0x99, 0x80000000}, {0x1, 0x10000}}) 17:07:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x12, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\'\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0xf32, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}, @in6={0xa, 0x4e20, 0x9, @rand_addr="75b32582822ba46605cae4c88f64bffd", 0x2}, @in6={0xa, 0x4e24, 0x1, @local, 0x4}, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0x9}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @multicast1}], 0xb0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x70) [ 381.395831] device bridge_slave_1 left promiscuous mode [ 381.401755] bridge0: port 2(bridge_slave_1) entered disabled state 17:07:03 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x0, 0x81, 0x7f, 0x200, 0x2fa2, 0x4}, 0x3ff, 0x1, 0x8001, 0x0, 0x1, "4fa4b7b21147953759a2294dc9395a3fd27160411e19c8b4d4ffa2512c3e1c04f29ceaa0e56677b758395547e829be7f8b88c06f605340abd61f8f98bcb71883e0207f1c72fb6f4a4cc506b96d0f63884cca4407c67f82973460b7c80d244f248abf07b424d73e2cc3c9757c8c4eae6d66dba7e92b54389e62349c092b14bb68"}) 17:07:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000002c0)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xa}, 0x10) 17:07:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x13, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x20000050) 17:07:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00/\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 381.512989] device bridge_slave_0 left promiscuous mode [ 381.543382] bridge0: port 1(bridge_slave_0) entered disabled state 17:07:03 executing program 4: r0 = socket(0x2, 0x80a, 0x400) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x78, "61dd836a8ea15961b4475c74a8eb1efb0f7d2614680f2a72a8e1db248d537baf0bc71f25a84bf7cb50df6357183221270a33116145b56af6e91504ebca647c6cf761a165d542217f6abbe84ad5ba189d7f0ac56e8f34e6c57373a3c099dcc69846b1ace9bfedd392031b0a3e65f4746d1fb0d9c7b9ac3c5a"}, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x7fd}, 0x8) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000dfff0000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) socketpair(0xa, 0x1, 0x7, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r4 = syz_open_dev$midi(&(0x7f0000000b00)='/dev/midi#\x00', 0x9163, 0x2) r5 = open(&(0x7f0000000b40)='./file0\x00', 0x80000, 0x13) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f0000000b80)={0xf, 0x2, 0x6, 0x80000, r5}) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)={0x228, r3, 0xd14, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9e38}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x755}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x312}]}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8ca5f56}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff80000001}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffd04}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xcc}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x4000080}, 0x8000) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) ioctl$KVM_GET_XSAVE(r6, 0x9000aea4, &(0x7f0000000700)) unlink(&(0x7f0000000bc0)='./file0\x00') r7 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x400, 0x408100) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000380)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000d40)=0xe8) r9 = getegid() fchownat(r4, &(0x7f0000000c00)='./file0\x00', r8, r9, 0x800) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8180, 0x0) ioctl$LOOP_CLR_FD(r10, 0x4c01) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r10, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 381.844032] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) [ 384.768686] device hsr_slave_1 left promiscuous mode [ 384.839852] device hsr_slave_0 left promiscuous mode [ 384.908949] team0 (unregistering): Port device team_slave_1 removed [ 384.920622] team0 (unregistering): Port device team_slave_0 removed [ 384.935552] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 384.993581] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 385.109323] bond0 (unregistering): Released all slaves 17:07:06 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3ab85f04000000d2eb", 0x10) r2 = accept(r1, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000300)="fa5fe1d11206526ec657e9d31166fb41665f0d74e678235b61199ddd7f16b21c65366a07bea5e6b460e32fc4abda61bebb8f34601bf3b5e057f1984a3246b6725554e62520feb63a156cca9a2847a9eaf3cf118df3eaf89ae9e2882c6407031b5434bb4a2a09a89f492648ed26128ee026e0d8e5f94230b6a91bdd63be837806edd0da7d44ec7dc44f3375e04f857974", 0x90}], 0x1}, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00H\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:06 executing program 4: clone(0x40120, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000bd30000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x400, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x748, 0x308, 0x168, 0x308, 0x168, 0x168, 0x678, 0x678, 0x678, 0x678, 0x678, 0x4, &(0x7f0000000100), {[{{@ipv6={@mcast2, @mcast2, [0x0, 0xff, 0xff000000, 0xff], [0x15b8720457092370, 0x0, 0x650b76dadc687a39, 0xff000000], 'ip6tnl0\x00', 'bridge_slave_1\x00', {0xff}, {0x69417fafe7ed01af}, 0xbf, 0x1, 0x1, 0x40}, 0x0, 0x108, 0x168, 0x0, {}, [@common=@unspec=@connlimit={0x40, 'connlimit\x00', 0x1, {[0x0, 0xffffffff, 0xff0000ff, 0xffffffff], 0x6, 0x2, 0x394c}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@remote, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4e22, 0x4e22, 0x4e20, 0x4e23, 0x5, 0x1, 0x7, 0x3ff, 0xfff}}}, {{@uncond, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x1f, 0x2, 0x3, 0x1ff, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @remote, [0xff000000, 0xffffffff, 0xffffffff, 0xff0000ff], [0xff0000ff, 0xff000000, 0xff, 0xff000000], [0xffffffff, 0xff, 0xffffff00], 0x0, 0x10}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@loopback, 'hwsim0\x00', 0x477}}}, {{@ipv6={@local, @dev={0xfe, 0x80, [], 0x25}, [0xffffff00, 0xffffff00, 0xffffff00, 0xff], [0xffffffff, 0xff, 0x0, 0xff000000], 'syzkaller0\x00', 'bridge_slave_1\x00', {0xff}, {0xff}, 0x2f, 0x22, 0x1, 0x49}, 0x0, 0x248, 0x370, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x20, 0x7, 0x0, 0xfffffffffffffff8, 0xa, 0x7, [@mcast1, @mcast1, @remote, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @dev={0xfe, 0x80, [], 0x12}, @ipv4={[], [], @rand_addr=0x10001}, @local, @dev={0xfe, 0x80, [], 0x28}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, @ipv4={[], [], @rand_addr=0x1af}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}], 0xa}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0xffffffffffffff7f, 0x1ff, 0x62b, 0x1, 0x80, 0x401, 0x7, 0x1, 0x1, 0x0, 0x100000001, 0x4, 0x1, 0x0, 0x1, 0x5], 0x4}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x7f, 'system_u:object_r:restorecond_var_run_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7a8) 17:07:06 executing program 1: getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10003, 0x0, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x7, 0x3, 0x3, 0xf, 0x1, 0xffffffffffffffff}, @alu={0x7, 0x2, 0x5, 0x0, 0xf, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x31}, @map={0x18, 0xf, 0x1, 0x0, r1}, @alu={0x4, 0x6, 0xf, 0x1, 0xf, 0xc, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x41000, 0x1000, [], r0}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r2, 0xd}, 0x10) 17:07:06 executing program 4: clone(0x180243fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000004000009500000000000000324720382903e001a12d27d37d8a76e0c46a46213f84db234ac3c5aa98d942457cde8b3712114d6f01f657d7afb943cc77541c"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x423, &(0x7f00000003c0)=""/251}, 0x33) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername(0xffffffffffffff9c, &(0x7f0000009b00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009b80)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009cc0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000009dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009e00)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000009f40)={0x11, 0x0, 0x0}, &(0x7f0000009f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000d400)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f000000d500)=0xe8) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000200)=0xf5) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f000000dc40)={@mcast1, 0x0}, &(0x7f000000dc80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000dd80)={0x0, @multicast2}, &(0x7f000000ddc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f000000de00)={@remote, @dev, 0x0}, &(0x7f000000de40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000dec0)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f000000dfc0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f000000e000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000e040)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f000000e2c0)={@local, 0x0}, &(0x7f000000e300)=0x14) accept4(0xffffffffffffffff, &(0x7f000000e340)=@xdp={0x2c, 0x0, 0x0}, &(0x7f000000e3c0)=0x80, 0x800) getpeername$packet(0xffffffffffffffff, &(0x7f000000e400)={0x11, 0x0, 0x0}, &(0x7f000000e440)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000e480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000e4c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000e500)={'vcan0\x00', 0x0}) r19 = getgid() getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x800, 0x6, 0x800, 0x7, 0xc0}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000580)={r20, 0x401, 0x30}, 0xc) write$FUSE_ENTRY(r1, &(0x7f00000002c0)={0x90, 0xffffffffffffffff, 0x5, {0x6, 0x2, 0x1, 0x384, 0x9, 0x591eaaee, {0x3, 0x39b2, 0x8, 0x6, 0x3, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0xfffffffffffffbff, 0x5cec78d1, r6, r19, 0x3, 0xffff}}}, 0x90) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000fc00)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f000000fd00)=0xe8) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f00000001c0)) accept$packet(0xffffffffffffffff, &(0x7f000000fd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000fd80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000fe80)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000103c0)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000104c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000010640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000010680)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000010c80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000010c40)={&(0x7f00000106c0)={0x578, r2, 0x8, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x1bc, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x200000000000}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfc3}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xd0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x686}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r12}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r13}, {0x7c, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x20bfa5ed, 0x7, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r21}, {0x48, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8b2, 0x8000, 0x5, 0xfffffffffffeffff}, {0x1, 0x3f, 0x6202, 0x4}]}}}]}}, {{0x8, 0x1, r22}, {0x124, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r24}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0xff8000000000, 0x3f, 0x5, 0x100}, {0x9, 0x6, 0x4, 0xfc000000000000}, {0x1, 0xffffffff00000000, 0x6, 0x8}, {0x7, 0x9d, 0xfff, 0x3}, {0xdb, 0x2, 0x8, 0x20aa}, {0x5, 0xc98, 0xa2d, 0x8}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}]}}]}, 0x578}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00L\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x15, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:07 executing program 4: clone(0x802122001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xb67, 0x20800) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0x6, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x400, 0x9, 0x6, 0xd, 0xffffffffffffffe6, 0xffffffffffffffff}, @alu={0x4, 0x7fc46e0a, 0xf, 0x7, 0x8, 0x50, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x6, 0x9, 0xb, 0xfffffffffffffffc}, @generic={0xfffffffffffffffd, 0x81, 0x7, 0xff, 0x9}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0x9d, &(0x7f0000000140)=""/157, 0x77ff5e7f7fd255c0, 0x1}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:07 executing program 5: socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) 17:07:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10001, 0x101000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000100)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x12, r3}) 17:07:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000002}, 0x10) 17:07:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00h\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:07 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x9, 0xffffffffffffff6c) clone(0xfffffffffffefffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:07 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @remote}, &(0x7f0000000080)=0xc) 17:07:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000008790221a0000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:07 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400140, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000080)=0x3f) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000967400006e277e00"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x6, 0x0, [], [{0x8, 0x7, 0x3f, 0x4, 0x101, 0x20}, {0x1ff, 0x5, 0x7, 0x1, 0x3, 0x7}], [[], [], [], [], [], []]}) socket$inet_udp(0x2, 0x2, 0x0) 17:07:07 executing program 4: clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00l\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000003}, 0x10) 17:07:07 executing program 4: removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.upper\x00') clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@raw=[@exit, @exit, @ldst={0x3, 0x1, 0x7, 0xa, 0xb, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="c2e93bffffd1bb4053178e5786ee48b97b3fa7edff00008d456016f64c0d83e4d96d9160471d083cb10f0a72b3ce189d6ff69416d2104ec8f363599337a9d5006b4e4626ca698847c576f58e460feaa70303220cf121deb52b46ba361992f8872fb8b7edc7b3b9e987628ab12e3b8ffcefa6d2c077c7e78fd518661e64b20d53ddc4043c52861d1445d4960a4f5eb150babac8d70da2678bc3358d37ecb29b5b527ffb73b10a8d875969e97bf885e39cc28961157604e4aec608d4d88a0c90663e927ab4379917a6accb233149b1b03d11038fdb5046d5fddf874739eb53209a78ff59d57cb3ed73b6b78494abf266a9e4"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:07 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f00000000c0)="80b86e97c868a9fd27188bb91515c17e034b000000000000000000000000") 17:07:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00t\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:07 executing program 4: clone(0x802122001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0x0, 0x0]) setfsgid(r0) 17:07:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000004}, 0x10) 17:07:07 executing program 5: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket(0xa, 0x100000001, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x400800) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000080)={0xfb}) ioctl$SIOCNRDECOBS(r1, 0x89e2) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:07 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400041, 0x0) write$P9_RSTATFS(r0, &(0x7f00000010c0)={0x43, 0x9, 0x1, {0x92, 0x1, 0xf4, 0x4, 0x3, 0x4, 0x7, 0xfffffffffffffffb, 0x1}}, 0x43) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000040)=""/4096) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000001040)) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000001080)=[@in={0x2, 0x4e20, @remote}], 0x10) 17:07:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000005}, 0x10) 17:07:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00z\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) 17:07:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="180000000000000000f000000000000095000000000000008f768ff3dc6522d48ec3646325b8b2aa765c1d92b3d2c496f545ffff426e57f3d906ffc24796bf2171d393b727c6635aee201101e6b0268e00c42b5e5597762a583f23fce3b37c9acaf672c8b4296907d95ca38a674462d5f024f6ab82bf1e3585166df830b7c6d68676d37358f5d516665ec54002400f6bb3198eec70b320af8f0182263ae29ba82737cec8f385"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x80100) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000100)=0x1) ustat(0x8, &(0x7f0000000000)) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000a40)=@req3={0x7f, 0x2, 0x5, 0x2, 0x6, 0x8}, 0x1c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8080804}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0x334, r2, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'yam0\x00'}}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x154, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xca36}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff53c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4e88}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd249}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7e3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc2a}]}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x69a2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @mcast1, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsf0\x00'}}]}]}, 0x334}}, 0x1) getsockname(r1, &(0x7f00000009c0)=@in, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)={0xe0, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x299e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x8881}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:08 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000040)="69f22d0194a917361ccee6bdc4e6b35ac0721d22b2cbf24e49fdc36d96e39274b1c9") 17:07:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xa242, 0x2, 0x400, 0x7f, 0x4}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x26}}}, 0xd4e, 0x1, 0xa000, 0x7, 0x1}, 0x98) clone(0x1080400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000006}, 0x10) 17:07:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\xc0\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x8000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r3, 0x5}, 0x8) 17:07:08 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000080)) 17:07:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000010400000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xd}, 0x367) 17:07:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000080)={0x1, 0x2, 0x627e}) 17:07:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000007}, 0x10) 17:07:08 executing program 5: socket(0xa, 0x100000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = semget$private(0x0, 0x3, 0x8) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) semtimedop(r0, &(0x7f00000001c0)=[{0x0, 0x1, 0x800}, {0x1, 0x4, 0x1800}, {0x2, 0x20, 0x1800}], 0x3, &(0x7f0000000380)={r1, r2+30000000}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x200, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) r5 = getegid() write$FUSE_CREATE_OPEN(r3, &(0x7f00000004c0)={0xa0, 0x0, 0x4, {{0x4, 0x0, 0x0, 0x8, 0x400, 0x5, {0x2, 0x101, 0x5, 0x9, 0x101, 0x7fffffff, 0x400, 0x3, 0x1f, 0x6564, 0xffffffff80000000, r4, r5, 0x2, 0x2}}, {0x0, 0x4}}}, 0xa0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) write$tun(r3, &(0x7f0000000580)={@val={0x0, 0xaaff}, @void, @llc={@snap={0x1, 0xab, "0e", "4ab124", 0x88e7, "9d9bead1e9021c75319e1bae43eb7bff991bce2954d0468af66ef9ae499eb17dda1d98cce5ff77620141fe6b0e46e674f90369d31e80c97e451a3879af957b23c2811700dad99b2e21"}}}, 0x55) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x0, 0x10}, 0xc) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty, 0x2000000000}, 0x1c) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000080)={r9, 0x7fffffff, 0x400, 0x3}, &(0x7f0000000180)=0x10) socket$kcm(0x29, 0x0, 0x0) dup(0xffffffffffffffff) 17:07:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000078000000000000000d1b75e61fd743b87b04fe11923924bfdaef2b5c270a4bcab48a39e7730902bb69191bab68c9e6cd81557e1f44d242cf94f6582a6c4307d2b0"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\x03\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000008}, 0x10) 17:07:08 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x3, 0x40, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001280)=0xe8) bind$bt_hci(r0, &(0x7f00000012c0)={0x1f, r1}, 0xc) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xcdd3bd2f763988, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) 17:07:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000002c0)=""/125) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = fcntl$dupfd(r1, 0x406, r1) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x9}, 0xf) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x99f0}, 0xf) openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000140)=""/32) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000100)=0xb1b) 17:07:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000b}, 0x10) 17:07:08 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4080) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000600)=0xe8) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000100)={@bcast, @bcast, 0x2, 0x76}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x17, 0x7, &(0x7f00000000c0)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @alu={0x7, 0x1, 0x0, 0xa, 0xf, 0x18, 0x14}, @alu={0x7, 0x3528, 0xe, 0xb, 0x0, 0xfffffffffffffffc, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x4a}, @call={0x85, 0x0, 0x0, 0x3f}], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], r2, 0xf}, 0x48) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x40) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000800000000000000009500000000000000fb111ccae32263325e9c974d0252587380980ce18a03266c805e2e541a5f2a6b3c8f71601a5f03a513ab1139889e87664ee3ca9e8c979f5e9137e267c4e4a31bf5e7304e7e26dd8c9f9b3fa29dedf500fad6c4f67b17c6e471803eb723de4f75f44fa422652c088d82f24cdbd3163ccd880d6c7aaefc8a46f08c3b06cdcec06ca2d8a1d9f5ca82dc711c677459b9ab0065bc58035ecf031b579ab5150b056b8c2a5cd943013c70b273d3d3fbe2c1a1b3326e4efa29004b1240248c7636c808ba14e140ebc2991750ce7494a25cf632efbfe16da33b2c04eb036614440a8dc8b45e"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r3, 0xd}, 0x10) 17:07:08 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x3ffffe) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 17:07:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x02\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000d1ab9f4b1fc6985d0f139b3cc269beb4e8e5e44f85b2208911d86e775864af4e525bba04fc5a417447cc10d22f1963d9d684bc97c0e5433041ac3e33c087de2fd54d82ab9b33c88735908c47825d3a759275bf326a0bdc817e8faa8d69a63304a485eacda3eb9a460fac2382f7fa496f70f921101e08b0503523ee3c64bdf3f3c00000000000000000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cg<:\xd4oup.net/sy\x00\xd7\xa5\xb69~\xcc\x021G\xaas\xe4J\xcaF\x9b\xe3\xeb\xab\xeb\xd3\xa7\xb5\xa7\x15\xfcg\x94\x83O\x9d\'\xee\xb0\xad\xc6\x8c\v\xfb\xea.p/c%\xff\b\x8b\x17Cd\x96\xfd\xf1~f\xa7\x19\xaa]\x16+', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000c}, 0x10) 17:07:09 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8919, &(0x7f0000000000)) 17:07:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgro\x94p/s)\x8d\x03\xe7', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:09 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x0, 0x6}) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v2={0x5, 0x0, 0x1, 0x9, 0xb6, "a9b2c42fcb956155c11950f26f1342f4fc42b66249d8d78a15a9dba2fdc54c6c05ef9f5dc1d57b061159808c389b10dbd5e29589d8cca974ff8c2b07df67ace5bc3fe10368911ac0d6b6f01ccf2ce2b3665825f1c6408a307741a228756d8a9fb853b9e7c7fc340d0ba2ce0a933c26e0dc6a66b655e21333e6b4fe841aa85936900be904eba98aeaa71c2b962f2f9fcc5c6cd78cc31b91fc4bccb56de1c91b49d82db8dc8d0231693022af10abd6067402e2aa9c2628"}, 0xc0, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xd}, 0x10) 17:07:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x04\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:09 executing program 4: clone(0x8000004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0x3) 17:07:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000e}, 0x10) 17:07:09 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000040)='cgroup\x00') io_setup(0x9, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) io_getevents(r3, 0x6, 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000140)={r4, r5+30000000}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 17:07:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000f}, 0x10) 17:07:09 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xd}, 0x10) 17:07:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000080)=""/34, 0x22, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f0000000100)=""/116, 0x74, r2}}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r0, 0xd}, 0x10) 17:07:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\'\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:10 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x10) 17:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) 17:07:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x8) 17:07:10 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x1000, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x80}}, {@mode={'mode', 0x3d, 0x8001}}, {@mode={'mode', 0x3d, 0xffffffffffffff81}}, {@mode={'mode', 0x3d, 0x3f}}], [{@euid_gt={'euid>', r1}}, {@euid_lt={'euid<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@smackfsroot={'smackfsroot', 0x3d, '(ppp0trusted]+trusted}$nodevvboxnet1'}}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a/\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:10 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) fsetxattr$security_smack_entry(r0, &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x15, 0x0) 17:07:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000004706854a7f8a50286c61d05893a20000183371a2c9f9bc93ad7e3ad7b85e83ed"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x200, 0x80000) write$P9_RRENAMEAT(r1, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000180)) 17:07:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d, 0x8000a0}, 0x10) 17:07:10 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x3, 'hsr0\x00', 0x4}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x0, &(0x7f0000000080)="0a486bf2bfb1170091fccddce1a8a23277b722b16f8934895438dbdc275bae60194b717189e71d5a3d87e5c33640ca3fb7fb0a54a0aaf28cf6cc691d63dcf91b8b259f598b56f2e3b4f5a5d1cfc722633c6fb068621d49ab4d8bd139434d26b4399ff897db1f528561cc1bb18185990ae2fdc90e4815af415a61f03459fc40b66aea937091c3a0bb5dfc4d455bc9c475e5259d3f1621ebec87fe1982539a922f0e00000000000000000054f15b084f024cc4c293ecbcd21e56a9434ce26f9c5a270096c46ae3243f1a7dfca729da48453646") 17:07:10 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x484002) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x80000001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x81, 0xffffffffffff6f5a, 0x2, 0xe224, 0x6, 0xec, 0xffffffffffffffe7, 0x2, r1}, &(0x7f00000002c0)=0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000040000000000002e2d52c417b88a0bb4fa9babb20e00664cb9e257734dd58c1dfbe1cc420d202c292f9c5dc171422f63e8666e8e80f0b7d391f27c98cc000000130000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000004c0)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r2, 0x200000004000000}, &(0x7f0000000100)=0x8) 17:07:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\aH\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d, 0xa0008000}, 0x10) 17:07:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="dbd700b40000000010"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c80)=0x14) bind$bt_hci(r1, &(0x7f0000000cc0)={0x1f, r2}, 0xc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgz1\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x2000) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r0, 0xd}, 0x10) 17:07:10 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x5, 0x401, 0xffffffffffff8001, 0x100000001, 0x9, 0x1}}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x35, &(0x7f00000000c0)="b29ed41bd52f8ccc716f475bccdd73ad38d284a08623ee16ad8788b7b3fa610e5888457cbf8cea3bad8950d0655dd61812f879e51ad25be8a6420ef16a74512c3fe4d0d17e56852ac9f768957e5fd5abfee79a") 17:07:10 executing program 4: 17:07:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\aL\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="030000000000000000000000002100009500000100000200"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xc}, 0x10) 17:07:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:10 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d, 0x8000a0ffffffff}, 0x10) 17:07:10 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x404000) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x3, 0x0, {0x55, 0xfffffffffffffffb, 0x4, {0x2, 0x23}, {0xff, 0x6}, @const={0x9, {0xffffffffffffff26, 0x2, 0xffffffff, 0x327}}}, {0x52, 0x7, 0x6, {0xffffffffffffffec, 0x5}, {0x0, 0x6f0}, @const={0x800, {0x5, 0x3, 0x8000, 0x3}}}}) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)=0x1) ioctl$TCSBRK(r0, 0x5409, 0x24000) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000009000000000000000500000000000000", @ANYRES32=r0, @ANYBLOB="000000008000000000000000000000000013e41ecaaace80a2912b1b42783c69e316ae8c56ab62778575415b", @ANYRES32=r0, @ANYBLOB="00000000060000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="000000009a0e00000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000000000000100000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000040000000000000000000000000000000000000000000000"]) r1 = getuid() ioprio_get$uid(0x3, r1) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) 17:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000100002000000000000000000095000040389560d8738e000556f0a500c62f6a32e276594248f0d6586e619a84fa46224543da25fed2dad840c89c92ed5356fbede7d23f02df77397cab771c981351a98d62f012db4b2b0e935169e4de72c9134a97d03a42d37b7cc90fbb06848fa695e02a14a4102b012ae1c15eaf1767d644e3fd5d68b43cdc490dc5daa9fa0b885b"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101100, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x16) 17:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\ah\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd, 0xfffffffffffffffd}, 0x10) 17:07:11 executing program 5: r0 = dup(0xffffffffffffff9c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000180)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r1}) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r2, 0x8916, &(0x7f0000000000)) 17:07:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d, 0xffffffffa0008000}, 0x10) 17:07:11 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = getpgid(0x0) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x400, 0x32200) r3 = dup(0xffffffffffffffff) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xff, 0x6000) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000100)={r3, r4, 0x8000}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101800, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\al\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000000000b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) lseek(r1, 0x58, 0x2) 17:07:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x70) 17:07:11 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100, 0x8000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'vcan0\x00', 0x0}) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@loopback, 0x4e20, 0x0, 0x4e21, 0x9, 0xa, 0xa0, 0x0, 0x0, r1, r2}, {0x7f, 0x0, 0xfff, 0x9, 0x1ff, 0x1, 0x8, 0x2}, {0xf2, 0x5, 0x80000001, 0x1ff}, 0x5, 0x6e6bbb, 0x2, 0x1, 0x3, 0x2}, {{@in6=@remote, 0x4d6, 0x3e}, 0x2, @in6=@rand_addr="2ecfbeaeeb2f0b362e35e2ab57941f74", 0x3500, 0x7, 0x0, 0x3ff, 0x3, 0x5bf0}}, 0xe8) r3 = socket(0x40000000000a, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r3, 0x8917, &(0x7f0000000000)) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000100)={@multicast2, @dev, 0x0}, &(0x7f0000000140)=0xc) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000180)=@can={0x1d, r4}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)="b1e0b3d548ae5aa5add23e90b50e69286b39b8d50e1c4902437654d14cd2f8e1fb56a6f99b93a8ba9b09", 0x2a}, {&(0x7f0000000240)="2af68874c29e1b203f02ff97ce1ae95fc731fe7423caddf07a58e9cde47c16dcc114ede70e459b9a485c570622e5b6a099a0bac19a795fcbb2c70a2336cf21de0cac016ae121276749fa1a4edc3a73680804633bc8252bc070d1e66b2fc83954b1935adfb6d8c55faaece0b60ec8d06cb011b74356d5ba6da00357a8198aa790510d8c9f2181d5d7e819381c15a35ff0dcdf17d61d4aba84daac03ebb07d0ce33a8f9432523cec86e1ca8d2cfcba4458ef69c2df02b05b60", 0xb8}, {&(0x7f0000000300)="5f5de697744eca734271e05c57dc7be75f5cf5d094d9032d9053cddebe18388a86a3554dcb80e491c487071ef306607106ab279b8838d868d7f862eb92392cb279663e0d7b595419613df504907e2110c96390474d73457dfcee1e87bc18ebef4fd3ce1472b1160768dd79b96f7e279939fbfa54f50769a4b1a14f6517c0aa290aa5f6008cd0256d2c31e1d52ca9267443f5bb70a701fbc3aff16ad8db61aa0872d622b633f4f34011c418f5911d46e9f9", 0xb1}, {&(0x7f00000003c0)="54260c7b0021c4c930d3fc19209bdf994ec2353c803abf6a39cd76af5590b44a2dde824fb6e96a33a61e69aebadffb27ca4ad74cdb11a9608f2a8e71e291949cdc9d5de86faa6c8b10a221f3305f2954342446399980eefcc42646c35b105efc4e730cb4d8354bff6748e3e06f92c63a2226503f0c597c6903dd40b1c7c847d8e1558c9a73adb9f78d78e35adf864183188e45bdc28915e3c1d4fc2f710f43c76c0a7787df40982a559e9538ce53", 0xae}, {&(0x7f0000000480)="2be383112440048c37c9ab1ebf751ca9d2dcc8e81cb2c168c924d56b788baf635f30d5de69765d8261c2ee9f5e7642d385b121c4d22b7d69d464c17e2ab9739a9e8a6f854d0d8a17dd6141d68dc0817e64f26764dba20870e90713ce767a866f6814f38a46bc5f118d2b023b05517f32ee7c", 0x72}, {&(0x7f0000000500)="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", 0xfa}, {&(0x7f0000000600)="c694d9abd41fbcb735a83206de", 0xd}], 0x7}, 0x40800) 17:07:11 executing program 4: clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) capget(&(0x7f0000000040)={0x19980330, r1}, &(0x7f0000000080)={0x7fffffff, 0x1710, 0x2, 0x1, 0xde, 0xac}) 17:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\at\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:11 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40007f, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000100)=0x4) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0x8, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000180)) 17:07:11 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:11 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x101000, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) clone(0x1008000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x20000000008000, 0x0) fallocate(r0, 0x4, 0x0, 0x4) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x23}) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) 17:07:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18004a000000000000000001000000000800000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x20000090) 17:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\az\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000ff0000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r1, r0, 0xc}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x9) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000080)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000100)={'eql\x00', 0xc0000}) 17:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="009500000000000000eefbc2fa54ce2f590726dc99327b9b656622575d2f839068de8e2605b105a7e841d0cecb264e92bed197eefa0e48941b97799a151c2b6ef6f67d9ccde9232eae8a1544c157a03326a1c1f7ac1cabe84587830b6d4d357e5d7597b588ba6077f2902f55e9329a8bf1fb7142974cf81ea220e76cabeb85fec666f2df303dff60ffb20900000047b42569d0007b02609a8473ffe7baf7a5136dea000000000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:11 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x1ff, 0xb63, 0x647a3b5c, 0x6}, 0x14) r1 = socket(0xa, 0x100000001, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x0) connect(r2, &(0x7f0000000000)=@ax25={{}, [@null, @default, @null, @default, @rose, @remote, @bcast]}, 0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) signalfd(r0, &(0x7f0000000100)={0x3}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000180)=0x8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800001fffc00000000000000000009500b4000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x800, 0x0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f00000001c0)={0x2, 0x2}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x1000000000000000}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x88) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000080)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) 17:07:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\xc0\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:12 executing program 1: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:12 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = accept$inet(r0, 0x0, &(0x7f0000000040)) r2 = fcntl$dupfd(r1, 0x406, r0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000180)=0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x100, 0x0, 0x10003, 0x66b2}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000000c0)={0xff, r3}) sched_yield() 17:07:12 executing program 4: clone(0x4004000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000080)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x2000) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000001c0)={0x3, 0x4, 0xa95d386, 0x5, 0xc000000000000000}) 17:07:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000f7000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000080), &(0x7f0000000100)=0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00 \x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:12 executing program 5: r0 = socket(0x5, 0x100080003, 0x45) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x5) ioctl(r0, 0x8916, &(0x7f0000000000)) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r1}) 17:07:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000f3ffffff00000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000450000000400200000650000000052a94f288fd70032a101023270e49251af9a46087f77bb6230d218a39f96261319c5abba6aa8e79b40d567a7aa8105cdf5ad84f228c3ec637ad49e13f63f602c7cc9da14eec950"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x10000, 0x40000) ioctl$KDDELIO(r1, 0x4b35, 0x90a1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:12 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x3}, 0x183) 17:07:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\'\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:12 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x7) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:13 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x30002, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000080)={0x2, {0x4, 0xfffffffffffff6f1, 0xfff, 0x4}}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = shmget(0x0, 0x3000, 0x80, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) 17:07:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x40000, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000004c0)={"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"}) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x6) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000180)=0x0) kcmp(r3, r4, 0x6, r1, r2) 17:07:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00/\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:13 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) sendmsg$rds(r0, &(0x7f0000002c40)={&(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002c80), 0x7b, &(0x7f0000004040)=[@zcopy_cookie={0x0, 0x114, 0xc, 0x3a}, @rdma_map={0x0, 0x114, 0x3, {{&(0x7f0000002d40)=""/4096}, &(0x7f0000003d40), 0x7}}, @rdma_map={0x0, 0x114, 0x3, {{&(0x7f0000003fc0)=""/44}, &(0x7f0000004000), 0x58}}, @fadd={0x58, 0x114, 0x6, {{}, &(0x7f0000002580)=0x1, &(0x7f00000025c0)=0x100, 0x101, 0x1ba4, 0x0, 0x778bda25, 0x20, 0x2f0}}, @mask_fadd={0x0, 0x114, 0x8, {{0xfffffffffffffffb}, &(0x7f0000003d80)=0x3, &(0x7f0000003dc0)=0x81, 0x10001, 0x5, 0x6, 0x6, 0x0, 0xfff0000000000000}}, @rdma_args={0x48, 0x114, 0x1, {{0x10000, 0xfc}, {&(0x7f0000002700)=""/164, 0xa4}, &(0x7f0000002a00)=[{&(0x7f00000027c0)=""/64, 0x40}, {&(0x7f0000002800)=""/112, 0x70}, {&(0x7f0000002880)=""/53, 0x35}, {&(0x7f00000028c0)=""/183, 0xb7}, {&(0x7f0000002980)=""/39, 0x27}, {&(0x7f00000029c0)=""/29, 0x1d}], 0x6, 0x34, 0x7de4}}], 0x1b0, 0x8080}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x5) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:13 executing program 0: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @rose}, [@null, @netrom, @null, @null, @bcast, @bcast, @bcast, @null]}, &(0x7f0000000100)=0x48, 0x80000) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200), &(0x7f00000002c0)=0x8) r1 = open(&(0x7f0000000300)='./file0\x00', 0x8000, 0x100) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x220}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\amA\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:13 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000680)={0x53, 0x0, 0x21, 0xf0bf, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000440)="6bb77d6aee7aea03df963977489c62735934c763ea789eb782408085a28fb0530d", 0x0, 0x5, 0x4, 0x3, &(0x7f0000000640)}) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:13 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x404000, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x7) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100), 0x0, 0xfffffffffffffff9) keyctl$describe(0x6, r1, &(0x7f0000000140)=""/189, 0xbd) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000002ca00d1cc4abca50c8e480f40f7b000000000000f2ffffffffffffff00000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) socket$unix(0x1, 0x2, 0x0) 17:07:13 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000000)={'bcsh0\x00', 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r0}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40, 0x2) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000040)=ANY=[@ANYBLOB="020000000000000002004e2400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000002004e24ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1e000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e227f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000007f0400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414bb00000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000002004e20ac1e000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffe00000000000000000000000000000000"], 0x490) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00H\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 17:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000993edbfab4000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000002c0)) r2 = dup2(r0, r0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000000)={0x3, 0x6}) getsockname$packet(r2, &(0x7f0000000080), &(0x7f0000000100)=0x14) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0xfffffffffffffffc, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x18) 17:07:13 executing program 0: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="1827a5e8f19504b3d03974216600000000000000000095004000000000006ae1b23cad04569a3fa9f91026fbdd6a893bdb781e7ed799a161d6538d31ec9c29a25df25345b2d3212eb8c31074e8aa1817e7cb49b2fa6e8aa024e6129ea8c5c6ffdc72d2eb48b7ac1dd4bf057e74ef4d280df6b0478abedb19cfed3a459193201402a8a31367b7ca380f01fe3ca69d9a8598442a2b8406d541a2f0c666e06c5e6ca8892fea54287fba94d565ed5f685fc33c0c4b0cb8d2532db810c16f7064e588"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000005c0)={@local, 0x9, 0x3, 0x3, 0x4, 0x6, 0x8}, 0x20) r3 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x1, 0xd0000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x80000001}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000300)={0x5, 0x0, 0x8, 0x100000001, 0xfffffffffffffff7, 0xfffffffffffffffa, 0x7, 0x3, r4}, 0x20) getpeername$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000540)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x25, r5}) io_setup(0xffffffffffffffff, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x80, 0x0) connect(r0, &(0x7f00000004c0)=@in6={0xa, 0x4e21, 0x100000001, @mcast2}, 0x80) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:13 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000001240)="223e6f69e31fd410cd937aba46cc3e65d2f72317a13a69fbc7fe9ded6038df84793a5a084d134b3b32c7fbbdcfe614feb68f95b49663af42a550c3b63477888563b9550545721c8757268ece4cb1a15c79f9489cd902b8973e5c32e28cb2d9819fda0256a3b77d9a6acb08860c2ca85fd5fa9bd6eb50e181c08bb28e506b32a5967afc") r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000180)={0x134, "c6e7feee9be3ca65e3060e20ab47e41c1ecfb8252a565028aa5dec96e789f35a", 0x2, 0x3, 0x5, 0xcd408c, 0x40001, 0x2}) getsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f0000000200)=""/4096, &(0x7f0000001200)=0x1000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r1, 0x50, &(0x7f0000001300)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r2, 0x4) 17:07:13 executing program 4: clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00L\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x20000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x1800000000000000, 0x2, 0x7}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000100)={0x3, 0xfffffffffffffc00}) socket$nl_generic(0x10, 0x3, 0x10) 17:07:13 executing program 5: r0 = socket(0x7, 0x400100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgro?\xceg\xb7\n(\xf4', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00h\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x480000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x20, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xd78}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x8041}, 0x20004000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:14 executing program 3: socketpair(0x4, 0x800, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000100)={0x1, 0x42, 0x2, 0x81}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x20000000000002be, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0xfffffffffffffffd, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgr\x00\x00\x00\x00syz1\x00:!#\xc6\x10\xcc\xd7\x1a\xbfHc\x00\xff\x9cPD\x05A\'\x13\x97\x7f\'\xa2\xef]', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:07:14 executing program 4: clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:14 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x220081) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000080)={0x1, 0x0, @pic={0x3, 0x10000, 0x8001, 0x4, 0x289eb446, 0x4, 0x0, 0x3b3, 0x5, 0x5, 0x7fff, 0x101, 0x9, 0x0, 0xd3, 0x2}}) 17:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00l\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x269) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xf, 0x3}, 0xff53) 17:07:14 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x62200421}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xe4, r1, 0x700, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_1\x00'}}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc92b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd2fd}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcc}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0xc0000000) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000180)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xffffffffffffff78) 17:07:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="95b22aa275108e115d8c5f7420638a3b91af109682c6bbcf2bfba8a9e697f18a6b8a16b78eefb2797542805592c793277a688c884ece5926bbc0e0c30635967cc5c1f2e1ff9dfe8aac0d79cdb50832eded92fc0cb24786139c481edd7dab8d1c2e1b7d8b0dcaa9eaa795487099f72de48a9ddf6abe0634bf286306e1a06990b0dc27c8a41e8fc5c03d52b73b7652ae9383fe057b85a4b36122d61c017efafa6c44ecf68c12cca139b52642398f457152a2157178b0885ef95770b1f5acb26f3cea99d4d6a85b89f230bc598606942f519a4e5f86c976343a65c9"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x101000) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0x5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) connect$ax25(r1, &(0x7f0000000180)={{0x3, @bcast, 0x8}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000080)={0x100000001, 0xb, 0x3}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:14 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000000)) 17:07:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x24800, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000300)=0x1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) fsetxattr(r0, &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000180)='syzkaller\x00', 0xa, 0x1) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40880, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000200)={0x9, 0x400}) 17:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\aAm\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:14 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @initdev, @dev}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:07:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x151, &(0x7f00000003c0)=""/251, 0x0, 0x3}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfffe000000000000, 0x202000) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000100)=@raw=[@map={0x18, 0x1, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @ldst={0x2, 0x1, 0x3, 0xd, 0xa, 0xc, 0xffffffffffffffff}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x5, &(0x7f00000001c0)=""/5, 0x41100, 0x1, [], r3, 0xd}, 0x48) 17:07:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x6a201, 0x0) 17:07:14 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x840, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f00000003c0)={@loopback, @remote, 0x0}, &(0x7f0000000400)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000800)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000900)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000980)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000009c0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000039c0)={0x0, @rand_addr, @local}, &(0x7f0000003a00)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000003ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b40)=0x80, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003c80)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003d80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000041c0)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000004640)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000004680)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004740)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000004840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b80)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006bc0)={{{@in6=@ipv4={[], [], @local}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000006cc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006d00)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000006e00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000006e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006e80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006ec0)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000006fc0)=0xe8) clock_gettime(0x0, &(0x7f0000008180)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000008140)=[{{&(0x7f0000007000)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000008080)=[{&(0x7f0000007080)=""/4096, 0x1000}], 0x1, &(0x7f00000080c0)=""/106, 0x6a}, 0x20}], 0x1, 0x10020, &(0x7f00000081c0)={r25, r26+10000000}) accept4$packet(0xffffffffffffffff, &(0x7f0000008200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008240)=0x14, 0x80000) accept(0xffffffffffffffff, &(0x7f0000008280)=@hci={0x1f, 0x0}, &(0x7f0000008300)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @remote, @broadcast}, &(0x7f000000aec0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000d700)={0x0, @multicast1, @broadcast}, &(0x7f000000d740)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000d780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000d7c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f000000d800)={@initdev, 0x0}, &(0x7f000000d840)=0x14) accept(0xffffffffffffffff, &(0x7f000000d880)=@can={0x1d, 0x0}, &(0x7f000000d900)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f000000dac0)={@ipv4={[], [], @multicast1}, 0x0}, &(0x7f000000db00)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000db40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000db80)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000dd00)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f000000de00)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000e980)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1930000}, 0xc, &(0x7f000000e940)={&(0x7f000000de40)=ANY=[@ANYBLOB="d00a0000", @ANYRES16=r1, @ANYBLOB="18002abd7000fbdbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="180202003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d00003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r5, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040005000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="7800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r11, @ANYBLOB="400002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="d000020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000104000008000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r15, @ANYBLOB="3001020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004001f0100007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c000400cf000508ffffffffff7f09080400000007000506090000008000010501010000ff0106060600000009000074050000000500ff08050000000104006a84600000fcff0506000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="7802020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r19, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000050000000000000000000000080003000e00000008000400ff00000008000600", @ANYRES32=r21, @ANYBLOB="38000100240001006e6f0a8c1b4a38801a746966795f70656572735f696e74657276616c0000000000e4ffffffff0f0000380001002400010061630000000000000000000000000000000000000000000800030003", @ANYRES32=r22, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400ff07000008000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r27, @ANYBLOB="080007000000000008000100", @ANYRES32=r28, @ANYBLOB="28020200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r29, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r31, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r32, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r33, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r34, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ffffffff3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000008000100", @ANYRES32=r35, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000100008008000100", @ANYRES32=r36, @ANYBLOB="840002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r37, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b757000000000"], 0xad0}, 0x1, 0x0, 0x0, 0x4}, 0x80) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:14 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'vxcan1\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/dev_mcast\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x1, 0x8}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000140)={r2, 0x7f}) bind(r0, &(0x7f0000000040)=@in6={0xa, 0x4e23, 0xfffffffffffffffc, @dev={0xfe, 0x80, [], 0x22}, 0x70}, 0x80) 17:07:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00t\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:14 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x54, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x105801) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7fffffff, 0x10000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0xb, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0xd, 0xf, 0xb, 0x100, 0x10}, @call={0x85, 0x0, 0x0, 0x1d}, @map={0x18, 0xf, 0x1, 0x0, r0}, @ldst={0x3, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffc}, @map={0x18, 0xb, 0x1, 0x0, r1}, @jmp={0x5, 0xae, 0x0, 0x5, 0xe, 0xffffffffffffffe1, 0xfffffffffffffff4}, @alu={0x7, 0x2, 0xa, 0xf, 0x7, 0x30, 0xfffffffffffffff1}, @map={0x18, 0xf, 0x1, 0x0, r2}], &(0x7f0000000200)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xb}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r3, 0xd}, 0x10) 17:07:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x80000001) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:14 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xef2, 0x18000) r1 = socket$kcm(0x29, 0x5, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x2}) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r2 = socket(0xa, 0x100000001, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0x2, 0x3f, 0x3, 0x1}, {0x1, 0x7ff, 0x66b7, 0x8}, {0x80000001, 0x6, 0x7, 0x5}, {0x6, 0x3, 0xb992, 0x8}, {0x400, 0xffffffff, 0x4, 0x7}, {0x2, 0xb98, 0x4, 0x5}, {0x80000001, 0x8, 0x0, 0x7}, {0x76, 0x81, 0x3, 0x8}, {0x8, 0xffffffff, 0x33, 0x8000}, {0x8, 0x3, 0x1, 0x9}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r2, 0x8916, &(0x7f0000000000)) 17:07:15 executing program 4: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000040)={0x1, 0x0, 0x400, 0x1, 0x14, 0x1ff, 0x6, 0x0, 0x9, 0x5}) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @ib={0x1b, 0x1, 0x8ba3, {"48702ccc211053bff2bf6f7b598f52ea"}, 0xdd7, 0x394d6087, 0x10001}}}, 0x90) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x18) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000455500000000000000009500000000000000507234ca650eb5c88a4343baf7b6262b8bfbbd88ff73c33bb72e080a257ca59e975a542196ec5eb5bd2e2d"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x101000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0}, 0x10) 17:07:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00z\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) accept4$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) ioctl$int_out(r0, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffff881, 0x400) recvmsg$kcm(r2, &(0x7f00000005c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/68, 0x44}], 0x1, &(0x7f00000004c0)=""/195, 0xc3}, 0x2000) 17:07:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000010000000000000000209500b40008000000b6defbaf"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000100)={0x4, 0x5, 0x2, {0xa, @pix={0x6b, 0x3c, 0x43353039, 0xd, 0x7, 0x4, 0x0, 0x81, 0x1, 0x7, 0x2, 0x7}}}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000090040000e8020000e8020000e8020000e8020000e8020000f8030000f8030000f8030000f8030000f803000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000534554000000000000000000000000000000800000000000000000000000000800000400000004000000080000000008000007000000030000000dfa0000080000000100000008000000020000005b0e0000008000000200000001e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009001f001000000000000000000000000000000000000000000000000c800636f6e6e747261636b000000000000000000000000000000000000000003ff01000000000000000000000000000100000000ffffffffffffff00ffffff00fe8000000000000000000000000000bbff000000ffffff00ffffff00ffffffffff020000000000000000000000000001ffffffffff000000000000ff000000fffe880000000000000000000000000001ff000000ffffffff00000000ff000000cb0000000800000011004e234e244e204e23042402000000810000004e234e214e244e20000000003000616800000000000000000000000000000000000000000000000000000000ff070000000200000100000000000000600053455400000000000000000000000000000000000000000000000000000001000000050000006909000005000000000000000700000005000000b30600007b0500000000000007000000888a00000000000009000000060000000098000000000000ac1414aa000000f6fe0000ff74756e6c30000000000000000000000069706464703000000000000000000000000000000000000000000000ff00000000000000000000000000000000000090405dd4a7e4c7bd5b0000000000000000000000ff0000000000000000000000000000006c00011e0000000000000000000000000000e8001001000000000000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000002000000000000002800746f730000000000000000000000000000000000000000000000000000000307000000000000280052454a45435400000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000"], 0x4f0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e20, @remote}}, 0x0, 0x1, 0x0, "482c1fdf86a3c8e199971a9b52f2fa00e267bd908c6f867d047f2a9197333a9f1236f3b1cac1dd78a4d06f0868c9cfb3ab9b3e864001ad484c7f39c50fd23a799ca9dfbd693103c9b13b579f3b5b67fa"}, 0xd8) 17:07:15 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000140)=""/105, &(0x7f00000001c0)=0x69) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl(r0, 0x8, &(0x7f00000000c0)="46375f52c34d2ef9345b393d846d61eb763ebda5f37a9b51ecf160826148ca205ff87e996ee460eb77fbbd9b5dd72b09ab6cbca45435a43abbad90605c3cf912dbe1ac90641cfd6ea431386fce7d590a78c4") fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 17:07:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x9, 0x1}, 0x3) 17:07:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xc0\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:15 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) clone(0x802122001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x100) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)) 17:07:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r0, 0xd}, 0x8d) 17:07:15 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 17:07:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000018900000000095000000000000005c672bc88fde4c9803cbde9f7ccd7552cbd210ec41260b8e7de7d9dc08aa81225d4bb6919359707c67fa5347f6b18b4ddc01e2769b148914f6dc8e87271cfc5f00000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x185800, 0x80) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x6) ioctl$KDADDIO(r0, 0x4b34, 0x3f) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000100)={{r1, r2/1000+30000}, 0x21, 0x8, 0x101}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000000000000000000008a92462b0d063550f6211aaa3307c6460cb3f4ae04ec"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r3, 0xd}, 0x10) 17:07:15 executing program 4: clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f0000003040)="f6d0b9e02fba9d8c8101e68405e884ac057c3e5c8fa38025c536a266b4481c4f0ac4fc23a29e7a24fd9019166bdd70eda1f9b4d94dc072be1438a53fcecc4d3a49f7eac0c4338b07fbfdc7f6c0456ab6b253eace220f66ba33e9ab43eef4f35382b63eb9728f95b6deccf62a9c5daf5e3267db53993b86d23eda8411eacc6e24299febb22c6d1e1ee03e298fa16680b182665d4955d9f35508c267773a85903ae84205f1cf4b3b476a1372b9b0e97ffa8804fa61691ad7e7f33e12cad288eee117474cc81b08b0bec2b670f2670cee19313a29efbd4547ced73d7b75f7c70dba223dd4eab6922bf48f90f594b58e5fc403e989b9d6948c45447b9ed21d1a2747f447e5a8007e7cc9c04e564ebdd82fe205deb03275b31aa577080d63f8be2c50118f2dc08e54bdd4d9c8c707f93ed82d97b1a818df9b051329843c99c442d6ca56a57dfba329280a75d46e20f7828233b0ab23d650d4a9277ab2e2aa1fa76e153c33eac1dfae2b42abee5e1b69c21539d9b3badfbf92f57c0c1feb23c709d3398775a782df32e880fd1d2ae7ce63df3c25de5b7d7204fd334eefd26c70246b2f122f802ff187559d513192030355e8bee5fab0211c57a0cbff7355ddd1e832f02655260bb4290c97566e97a21dbcc4985f5b42c7df4482e0b8d9cf74de10a1106d0909d3b0010928b19d1d50364319679a3fa39c5e1b9f934a2fbd12cefb734a49c4ea1258cf635fd4ed983f61e8dfacb60c3cd308097bd4591406667e220ef721d410dc55db39fe9e4b574f8e16f2f12c4e641c8b36093245bed9fd22e0dbf4dd2ea1333b97f1af38e65b30b7971ad3777d8b6469e0338fb3af45f3e942837803698c5290ee612b296036e793a35474927a9079645fd3f0784e54136486121ffdd6d75d7d3ab6f30d2535560037f675333b4ff44251f0fdb9a35df9b41b9d28330f9e20b0fe0cf93116e692b1dbdb1e83fdfea33f58428886fc7581f7f7a86a7423b422b1b10d7f98f59df13b8146655702a9bf473afb4b71db80826e8ce0ee374a0e6f35fe63621ee16871da5ec22477ca535eada45612eb191458d6c67e01aa9f3172e899630aa6bde86efc4df6fc4e4325542d30b7569de6b86ac750caf7f303d457dcb8c73d8bca066d736d3b3f314ac4cd229ca9113b1ac04e179bd0142e01391aafb62a99c23b538e8b81a4dfde67e778c8c8dd362bd7b9784adfdf0e1b5c268be3e6aaf4dd0afe02cc18248957b39c0106aa93d83436c42ea6bff46504c03b1ece2234adb83f564e513db3aad1a6eeb7f8824de07749befa99d7024d1bb137f21e6b5b65d128c4547b364e4dd457e6eff45a2586ab13c1053a20f117526dbedd516a9aee77e518df430c30821e2f0273b5a62e199e831864fa0fbacedafe8488f12fbbf9699bc34ee54dc805cc92c881733332b151f04ed996468ed553f8fa44e60242a7447e1c18aebe8563fc5bc14dc98965627dfb9bba572e3e1d52754fd97d3ac70ec53588d5268be8295236cbb49b5e9980175b3ee47e157da9493b1e75cf2bc55bae596af69230036b54d19d97354e4a75c9804d218affcbeda3c97940472b27b123c3161b612a8b951b57302e945ebb0309e3707c25da10465d6790f1dd40a932238b86524499b020b468ddc654d7547a6b923c782f2c3191d872da2a4fea3186c7d3797591b3aa79cba616a1d252fa0f15171bad97feaf52b661aa77de55864ee6e1fb54a98e958392e2e6233d255a123ccbf87c65552b2e59f58c7fae6c993b3fd4da199cf185ee0a29f3c7dae12c749dc69477698276fc156bb2787f7f2c63c7388300b4716411d3519b399c288bc8a4baff14105728f987b07e72ffd708fd581becd63b9e93951ffb349614788538ea46b7f762077a1f7461a500b2fec0b76180cc18434139f5739c99cb1a253eb075c3b241bd1032ae0b854485319859f032b1ef496f80fc1a31c81da670ff82c498dc2ddd6b2b217f99f0ae0ce75c9c46ce0f51e4e9601a41902135b38d8651e54ce4d99dee15aedf21ee828c7d7f7117b5be21c8fad40b10f8c0eaa3f22c205d5d804bc45470c2c6d5f132f9887d46d819131ae7c6bc8706065362b021722eba85ab10a2149df49943cd01b44571d21351931a49b91800fdd447ad8501fc4c1184fdce73f09e3ea0a0411c11323547fe9d611b10adb8d04a54fc5ba7d3a505d876883ebe21a588b67f922eeda3371602adbc99432040da47298a2433192ef0a6807080e7e6f66c6e93a38425c6cf72eed4ad949d452a0d46b13ce21933e4b012a7b059625fd2168ced6de180ce5ccd822f92dc61ff42742f09ccd30d0e96fbd6eccd6b4777ad9d4e8f81a29ae0370e48fa21b25469535574b564a44a6b80dcb4a20cf4d0f96709637daf9704de52e2003fb7db6ccef28002b1bf85b8dbc7f43a9802e0acc7c6c2afd9720132cf1add4421749badefe006dd1d051fc758438150bb89903fc1d602e56e97443ff0cba452450bfd553bc5bea9022094558c99eb3ea68e0c4976eba9d970af72fc70338213e4fe735f279b170946b6e2ee632d445c15b80fb30f5d0b87abfe7339fc59f3ecba71dde84cb6291b9966b56b12fe4953cea639fe994c6e333cb60ad39fb369307b5b8a1cd96be47697866a5e07f2440fb56924fe20bb2722b264b561986047774b2ab00ed3c3e4e9de88a77ea95925723c2ea6ecb8283cfce0873ed3e5179353f2d8a4a7e50b42bc49c417b6136670f88eb218145ce373c9d55b6456492c373e346e253811335d7d00167ab12a1d0357c4f1f8987c00a08b87f545b65134b827eb874b502cc4e1f377f619713251df76204f5206d8105f9fcdcc120723f48a4f5f0d6e7aa0db189307a34ad2c642b0f0361fa9ec6ae9a4e09785ad11d5fdb1a0fdc756061d82fca2995a5365289091e09330c2c8d0e961edfa78af6a6caa055d6f2f9fd66f976311da0eaf95ac2b137997ca14f18641506de89a1bfbdde5119be7e8eff3179949437be93b0ccfecc5ee2e49ce7bbb170b84b8b3979d934ff1e171d179d2b6f0067b1e0d0b88069e38be0089e8d1b35c7a637b0c754ab5bf5cd22fd672c62d9270658705bb5801d6be14c472c08a9d5279d660cde9dd85855544a5224f5d3f692a2506b775983bf93edfee8dd1840a28bf4aebe197480df8a032e9a153f8dbf130aa575a03544d4c0ba4f557cec3feca1270741991faa94099d997d3a3bb5a2e84150371167d8700a92c5b54dd67e1aa3f95429ea82925a842efa8118b77deebeb559f1d3d88d9c93849a3de731eccdf31d5149b8d227f06d4b2542fdeb1a9d6c67ff21a4008aeedfac1e7ff6f61ac717cd1a81f4ea060507d5885951f4fb644eb528e7cf0a795c823b729f33266dfc172b9f3ede6ab405100aaeca1a9f517d321523b9ba2facad8ab079a81848830c277b279924708e1fa8bf230dd713588dd7813c931788848ff132b7868d50b139cc6ac1c91d85a0b6a0639704e8f99f582c9115ccb2cf1d0ca950badca206f18668cdc89bb190ef883708a0a9e9ca548ef119dd3926040a2326add61908e0c2117ee1031962ee86be09ffd7d99feb4cf41875c358cd0a4601a38288bb0e7009fcdf75a7168c85fa9bf3fdd9a818cee9a3e2740acbd4fd246280007e0a0aa08787f76734be5d48fbd91f023d0ef2ea0e2add3a9cc2e0dbf735e7cf501a735b6c20875934b042164fd383c59ce56790f3dc4048475f3f114e21041b4782e828a395b2482d83b8ec5a54669217f7ff94fe9db640c1446520e3cd13293dbaf6a79de79c01ccbea060fa4cf361b373a57f32093d351c02927f333f57423bd44cff777d84a61aee52d556e5a9afa14685ceca55de04196589ea747d05834833fc94bb1010781c5f468bf40c2ac07dc279dd75f1fe1abe9954320ac31417113f3705001c3528daa48dd1500ff0599b3d356bb9f917d7515edee2fbe29f564703d249c064817e82a1e6a552ab65ede4ada0d2769c9f2fd12e6010358e89e2d6b6c0697165a89132143065dcbe75beaa8349885faa82acece4e3921dbc835e57b9fb22d6bf51e48c35d28b7ff0d3714c9a56290e5471d79056282a964a66498aeabbd5bb97d5a47221d1c16bd25ffe9c603a5617524b1c4a015c4678edd8f0dfff39dc62e1bb178a8a268d215118487c3b9601350a5f8b3360bf3b4fc9f911d1ba69b03659d657c710ec98744b14df9b9dd94853c622bd8dd9e8cc21e9111c3ed46cf3bae1717d32f7d04def9477a45d62d34e11ed253421d68ef3397ecc9468861b0cd99d7d15b3d319d251b3824724e8528f82d7ad71cbf23d12615132a7e0288de6a58653e9906ed47fa99c46365b2ffd71a1ed05a74b3560f3a20c0c10ca86b4a268df5a67cb92bf4fa86c972a8cc07114f8628f85ca68183a99035c4bc7a3640ba9de8b85b65fc36a5027bc6b37f7a53816ef35154d4930288d13735c3c4b1a5015ddca18fe2cdc12b68a483ff193a9a589ae1bd060472f0633fbd2ce08a710c1ee0ec98fca974a481f87f0160fc2e93807402c47da6b561dc309207852ef96f231cc53844b8586ff0ed38f95f7395b6d9c86a21db6f6223ab978665c6283b67cde161e503136c63320988b39143e795b81712242b1a818b40b02bdb55f440a7135adfef1e2d23779403ce070080e055d0616d2991856424d11a8f5be1b71d7da0d078db8501ec783f80af0e3fe75f7584c738a6d5f2a5948fcaf2f9e7a47c4b881b25521f681c1650fcccc79e344643aa456fa18f11fc4ca12cc83a869b3d571312d9b6a3a5839783a896cf7890d1f1df4b1b5dce49532bf5cff7df36f0a3165aca85db7c723fe92c3f3016809ed2d80fcb50dab476e3d01a1407d2ee6b20d2b1b323f4df490bd0bb4a9ba8d41423f606c60aba664ae395804a2e657d00af5bff75934a88dbcf6c60ea68a6d02b9189546a3a3f3da63a01d49651d1a70a31f16f5623b143f88c79e0d196702cc9cd9cdcf292258519d8d3f2109995b284e1aec4d4c88bcccd8354a15134b29e0e5554f7b95293262920d8733394eb23a71ce4ba6dc6ea9aa04eeb6982688914be4ba3b902fc50b9238eaf97d19273fc85b79b239bde0cd552f6838dd64537cf14d95d6a5b6f686f88574fae3cc61250ffe414dd8117cbdec1ae2267da503a890bc435848de9f575c677a9ac97d314d2006f3b494489b564bb904ec5ba335d9236c7bd352b24f98fd2827a09ed003cbfece8f9660571cc94df6bde56e486af9ff67c6f58d9ac809a61cdb460f10e58220a54dd94ee7f662063818997fc11e1e4f85430c9f2c6e71f1cdd583d98202b6b81d192e7310cc9220b68666a781951eae2a58a8c501429b6b6e9efb99efd77fa9dd6ec7dc88b8ecff9be5acc7112fa91e1186123c7994632812f60843358bae1977e7871bdf1974c7e9910c5ac2cf35fb95df6ac258ea159fcc3fa83efe82eb1502619851ae7ff642587c1b91f8423b7e31b70b236c00a2757dd3633b9b19b2c10bbedb7494a8d9592ffeb527c43c7933055b5754baba85043e57f3cf63532f1a7896406fc686ef7623fb62a5ca512fc3176f30282eb5ea709502018b8b31a020f8150d95b7d4462abe9d277d6b49e70052f933fd6a601dd912c0d0a1f1f0c4bdc4d908131904f251ef8505cf6c186e8f3fc3429af4c4daf748e76598fdb47d2870eaefb4fce425a5e050a976daea0c93e59e05e380cc03f05db827b714a08bd0ab4563eaf45f373c186a5395447d18b1d94dcb28883f1d9b38e3ea4fbd68ffa403c17d6b7112121", 0x11cb) 17:07:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\xa0\x01\x80\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff]) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="8a0000007d010000006700018000000000220300000004000000000000004535f56900000480010001000000000004000000000000000e002e2f6367726f75702f73797a31000e002e001067726f75702f73797a310012006d696d655f74797065707070312e47504c5d060073656c662b2b0e002e2f6367726f75702f73797a3100", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5], 0x8a) 17:07:15 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x891a, &(0x7f0000000080)) 17:07:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180020000000000000000000000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x3f, 0x7ff, 0x7}) 17:07:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x400000, 0x8) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000300)={0x2, 0x9e09}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2, 0xfff, 0x100, 0x400, 0x5, 0x1000200, r2}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$namespace(r3, &(0x7f0000000080)='ns/pid_for_children\x00') 17:07:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x01\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1000, 0xfffffffffffffffd, 0x8001, 0xfff, 0xd8, 0x100000000, 0x0, 0x401, r3}, 0x20) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:15 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)) 17:07:15 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/106, &(0x7f00000000c0)=0x6a) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:15 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x22c040, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)={0x7, 0x18, [0x5c, 0x7, 0x0, 0x7f, 0x1f, 0x6]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000db4f62b713ade5e2b440c696f76a000500080000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x2000000}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18a92c497b43ec4ca92200000000000000000000000000dc"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 17:07:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x02\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:16 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8912, &(0x7f00000001c0)="57cdfe26b21284ca85e526b2a3aec8c1b9210700000000000000cdfda05f5886eb72be44cb6115ea3058a4a962c4ee21c2048462b214571468259924f10752a0aa0aeaaf5f04a69f5fc045c4f5b5cf17066ff6b19d735c8956c9eaba056033790d0968c12c0574b87a16790b6cac39928d611f36b0397916186e8adbbc4ebe4db037735a") r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x212, 0x80001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in={0x2, 0x4e23, @local}}}, 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) 17:07:16 executing program 4: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x17) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x3f, 0x4) 17:07:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x6, &(0x7f0000000100)=@raw=[@call={0x85, 0x0, 0x0, 0x23}, @generic={0x10001, 0x100000000, 0x8, 0x4}, @call, @generic={0x2000000000, 0x8, 0x8, 0x6871, 0xffffffffffffff80}, @generic={0xd745, 0x101, 0x657012a0, 0x5, 0x1f}, @exit], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x4, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:16 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x301001, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x8709}, 0x28, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:16 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002240)={'lo\x00', r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x4, &(0x7f0000000040)) 17:07:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x400000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000002c0)=[@sack_perm, @sack_perm, @mss={0x2, 0x1}, @mss={0x2, 0x6}], 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000001, 0x400000) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000080)=[0x7fffffff, 0x5, 0x73c, 0x6, 0x5, 0xffffffffffffffc6, 0x5, 0x7], 0x8, 0x2, 0x401, 0x6, 0x9d6, 0x3, {0x5, 0x2, 0x3, 0x1ff, 0x2f, 0xfffffffffffffffb, 0x100000000, 0x9, 0x8, 0x9, 0x0, 0x2, 0x36, 0x78, "3c44306630e4b992c7a4d036f1c6f66c31dbadd11a2624bba5de8cebd2b69359"}}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f0000000180)) 17:07:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = creat(&(0x7f0000000000)='\x00', 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x7c, 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000180)=""/133, &(0x7f0000000040)=0x85) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0xc, 0xfffffffffffffffd}, 0x10) 17:07:16 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18120000eeffffffffffffff000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000680)=0x2ae) futex(&(0x7f00000001c0), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x25000000) r3 = getuid() mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x100000, &(0x7f00000004c0)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@version_u='version=9p2000.u'}, {@mmap='mmap'}, {@uname={'uname'}}, {@debug={'debug', 0x3d, 0x5}}, {@version_9p2000='version=9p2000'}], [{@uid_gt={'uid>', r2}}, {@measure='measure'}, {@obj_type={'obj_type', 0x3d, '/proc/capi/capi20ncci\x00'}}, {@uid_lt={'uid<', r3}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:16 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x7, 0x80, 0x2, "059e55190d1556a185c28cb393e75a59a8181012d21d6a2705169cc8a5e72f0b9387572e4678b364b00940c254308ced6e7d9a4544da20485d15ddd80ff797", 0x19}, 0x60) 17:07:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x04\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:16 executing program 5: socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xffffffffffffffff, 0x80000000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x40141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000900)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f00000005c0)=r6) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="42cc8e153379883c5af5b814419f2b648b4d7ca459ac81c3e7da73ec9bf8a5d8ea61889b5ddfb139520e96b0c2476b5b317efe0807f2f5150703484d0509e6e9a83fc10bfec7ea9819b7bf5359ec266d20d62198312caf7189a81420255dff55940729f17c1ec4ae084cd1c29c360faa2d204b6bad1f4ac6cf2c673c7d762f9a821647f096fc02d74416f0e9622a6140afbe1a8c92cabba8e5222956a5"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r7, r5) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000740)=0xc) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="0000010000000030e1d035b385af2a8b4c360e9d91dd88977cdbf35dfd153e455765394e223dbbc577e9f4fb855eba75dbcacc22b7e70b0b40b0318748136eecea289e2b336969f629926144842fecf108038216ce33172a72792fc52a9913939dca8e9d0066"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r8, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) 17:07:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f801000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) socket$pptp(0x18, 0x1, 0x2) 17:07:16 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) unshare(0x4020600) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x410041, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x38}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r1, 0x3, 0x3}, 0xffffff47) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x3f, @ipv4={[], [], @local}, 0x2c25}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)="83306856445ed28664168a8df9216b4bdbe53c4a2ccc90818be666a5c80f15f864cad3b3c2", 0x25}, {&(0x7f00000002c0)="e9a8b0a7cbf07f8944726a49e31762d1b00207c6fe32e7415136afb55f005b2745cb59c486c325cfd94df5aba8fde8f8dd1d62f60df7ae0a56f814207442e4c5bde70ea3cdcb3742da76af7d9f3d29f8425fd2bb28afcacf633610c3be0e8dde2706b616d0ed5d615255ca34e9ec717d848e094e1a3b1ea5430566310b518ecbd7154b3da795e0d8", 0x88}, {&(0x7f0000000580)="80fa63dad11f1c6c62733f84bf5bcbce08bd03c1198f5fb285896bc85675d2e225682ac3fef1ddddac8f051e43e2dc79d155bd492e9a1df9950144bfe65b6ebd1c1607cb118a5ef221ccc6b485dbdad8b1b7be25bd58b89dfd678e5f1738f97428407dbc2d9a453d0a6eef4c1bc1bc5932f5b79b1d2f28e6d6a922efe8246ca63da7db81f4e5cb9a6b13546850ea8b4280ffa1ab3e811ca737e67683f628cb4ae57cc8a566dc26d715c668718da47d", 0xaf}, {&(0x7f0000000640)="228eed24de4915289ed693e1653c9cdd29ce1b7dc977afc4568afc8f9084b22a9d5ca63b8252d9ee787f52a57cd206a686f569ef8458620de8249a6e82a5ab0cfbbd4c415a5a9ce7981a4b48262f2a8650e69c46056727749f12cf38a80c80a6b622ec6b7f14239fe3e3d683164d6620796e04ef25e1783c363a6f0bfba34dea5b5bdb9f4653d1ac9ed527e309de989005bfb4f343b2e22be710de416e92a9d94121f3d696b06a9bb3266dcab9d97acb78eb2b13ebbc50782e3b942b27bd1b9e3e62ff6b63672941464f29a3d9233b1adc3e5ffbe6ec3d813765dc6939f0e60b0f6c6c7aa0d2d34d507f45", 0xeb}], 0x4, &(0x7f0000000740)=[{0xc0, 0x0, 0x2, "5e1f9b062691218f444f4e0a7d66b3d03632b44c72e0c808ff7ca419d48b8412243e963b5db518ff7872b2b8c42e70429f44dfce6efada68c98c6f0da94249500bd5bad1895431320602ad3a354949de2633b7fde8642d4ea8f4f49a69a450689496a270435d47a36c6a16a48354a835f3abe2ec45e725acbdcfaf644b3d3a3cd36ab2470d94da0b75ad58950aa53bb2659a988dc5d6308d3a5cd9e069a9956d0ccb43192c493be9e91fd1"}, {0x70, 0x107, 0x1, "29f0ef8c0cb313400f43f824aa2073823999c2967e8c917b8bc57045bc4184b0660e4c2645623d53dd4810f72e608a32051caa79f9640ad97df47cee82401ec04b275506eed721f6ca6cc29f9902d55a1f38dc1e33e3cd859674"}, {0x20, 0x119, 0x9, "017ce950ba7121c0834e7509"}, {0x40, 0x114, 0xf5, "341326baa704f2c0daf96798845e9a83960895ca59b07ada0975cbf02951792fc68fcce29cd33aaefbac698a610c"}], 0x190}, 0x800) 17:07:16 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8001, 0x84000) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 17:07:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000200)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x680, 0x388, 0x388, 0x0, 0x278, 0x388, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d5, 0xfffffffffffffffd, 0x7, 0x2}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@rand_addr="7a48f114ebddca0cef88e756c8c81aad", @empty, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffff00], [0x0, 0xffffff00, 0xffffff00, 0x4631ab82f9cb1dc4], 'caif0\x00', '\x00', {}, {}, 0xed, 0x0, 0x3, 0x18}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x2a, 0x10}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xffff, 0x3, @ipv6=@ipv4={[], [], @multicast1}, 0x4e23}}}, {{@ipv6={@ipv4={[], [], @broadcast}, @loopback, [0xffffffff, 0xff000000, 0xb860b081158a301a, 0xffffffff], [0xffffffff, 0xb3f6af70cdfefdbf, 0xffffffff, 0xff000000], 'veth0_to_team\x00', 'teql0\x00', {}, {0xff}, 0x7f, 0x0, 0x2, 0x40}, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x18, 0x5, 0x5a}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="54f050b5aa7c4a4f963b609612ea6881", [0xff000000, 0x0, 0x0, 0xff000000], [0xff000000, 0x0, 0x0, 0xff000000], 'sit0\x00', 'gre0\x00', {}, {0xff}, 0x2, 0x4, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@multicast2, 0x5, 0x8, 0x5}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e0) 17:07:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00 \x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 395.007023] bond0: Releasing backup interface bond_slave_1 17:07:16 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xd}, 0x10) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4800) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x1, "b552bd58c4e09b81916a17481a6308499a8935060f6b813c89f7a81b3ac4457d", 0x5, 0x20, 0x1, 0x1, 0x100000000000001, 0x200000000003, 0x6, 0x2}) 17:07:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000004dc18c02000eee61191ba736029500000097dcf37a05e1a48ecb4ea8b279989fe77d7f8913f9b66f08d1321f1641618baf44dde027a180e8231ecb8711ee196fc80ed1b98ed900e0cab482bbdc9cb6cf523e6a"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x8}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x200, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x42c501, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f0000000080)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) getsockopt(r1, 0x3f, 0x1, &(0x7f00000002c0)=""/244, &(0x7f0000000140)=0xf4) 17:07:16 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x200) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x800, 0x5, &(0x7f0000000400)=[{&(0x7f0000000140)="b2ce6b6bcb96a60f66d797c6ebe34d4619bff9b5a7ddc1f30f070a30b2e1214de728fad66f99a129ef50c630204bdac721cda6c135b2de8f420d99b23eebd3319b1755d05d4e02b2471947cbf60ddf8785b3237fd04febb6188f", 0x5a}, {&(0x7f00000001c0)="eaca2435f5d6597fcca54d1452057d36f30a8f58c0fff2c8a80cf08a1d8d4a50a27518cf86d91f675553f2028d4207c5fe4b31c863120bba5961da0ce4a6ef7dffea1fa05764ab09ffb04fe5ac361a73bc4577958cd1e231ccb8ed51860e6dc64bcafb3fc03a56ff4d90d2dd58ce955dd81424d7177f9f17e4d196b516fdaf4396fd6d55d8dff98f4309f099d70be2840397", 0x92, 0x2}, {&(0x7f0000000280)="28685c30c826736afa5ae763546c4e0f2a0e848b9a1d", 0x16, 0xa3a}, {&(0x7f00000002c0)="153bc1c273478755d7d06db9fee3f4fd97551d8c0a07bf09fcdd816cc9dfb06fbe6d489d1fd959cc9af3910b847975b9b265cc9e00cbb0881a61e89ebb1bee4092191eac44861f189367fa91ddc360c40e5b2803f8a39df79d712f12658e0fea40c4347cba742d4a042dcb8d054892f7f70f950a687e879ce5dc1b1ca76ba6792cdbaed22edabb9298da125724c3a847385739fc66d5cceaea9568644331640497bf8dcfb1d5708dc95acd3711936ee55f9f48aa2f277dd81ee76666c650f2c7f37802e9ec56ed8c1f8dd73cc888e0d9380222a2847b4989dbd78d9e36f5d76853008843459894bcc37d3345b3506008498f6a7d", 0xf4, 0x7}, {&(0x7f00000003c0), 0x0, 0x6}], 0x804, 0x0) r1 = msgget(0x0, 0x80) msgsnd(r1, &(0x7f00000004c0)={0x0, "04849e5aa42eb106d57d7503b8558b980dfd4ae8f62e5df8b2991bf3e5f88fae22f285067efd6bf35e4619ce3b45bc85ecca6bf5c03d4a51e0cb98cd0c0bd13c55dfd61b60100f44db41d40c39dfaa1c48562baa36fa683b0396dd6d432b1eceee85ee4523e88e59b48ede12692afd0e3d527c08d0003218f9bf970f208a3fbdc3fd0a51ab12924ce7c97a"}, 0x93, 0x800) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000580)={0x0, 0x0, 0x8, 0x0, 0x3}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000003c0)) 17:07:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\'\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000380)) 17:07:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b4000000000096010c6797dfd3c24271102be4908aa4a10e2f5c37b36d9b7e623e9e500a3d010c01ea31eda762ebd6f8699af863f668c4071182d586ad4351b96778aef0e596c7602f7aac592db679695dd619ae6ce7af8f246a8eed38e9af7d3eff4cb0f409fa854eb19b9ed40a8fd1914da564cdb81fb6d25228e82a650caeee6b1967074cba3fa677c344ce40880a51e1e2d59f991f6a1b99dfa64affeaafb2a64c935b7b46650be01ad76fd07856d58d1fc2f04a6be66e6df167cc39984cd4312cc2bafc7f35d9e92f1c03b78adcadb091a2a319feb2000000000000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x3, 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) write$P9_RWALK(r1, &(0x7f00000000c0)={0x9, 0x6f, 0x2}, 0x9) 17:07:17 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x719) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000340)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000009b000000d12591f9b6b8144331eabb3c54d93f3706aa0ae97ebd8993ca5842c4d45332c1a901cf1b3e17cbe5342c8911d8bb2012386041175864a715aa2329eec02b93449cb9ea6afa4845f7e04fa1e6ad7ecbf3933f443f288eaf8e17e5216ee8066ee0f5d90be0692884600dd8098ea1da5d17b4f7c29cc45da3eff0152a45b39683e3b88c9b7858296d481c41cc284244df36cdda5e921178d36c9883172786156776da42caa807b87fbd5d596184627483bdddb74645209d5ca7c77e68e07957508fa6797e501552f2d7d81ebc625ddef9b8a8996b827f0ee71da85a923d81d78377105e27403b9cc8d3531796c1b13e6b0a8bdd3a1085023cd322d62bee53e0db01bfa054abf9ad4f3966f7b962bab3d55bb1dd2e16afaf3550ac14361f02eaaedab946a604f21cc07914c82bc100c4365d05b9a7e7b8e5ed3c91617852865489a1e0d230fad6255ad80dfc01a0a2392e7c98bca7fbadaeebe066c0425a86b59a81e162ff7c9f47d8d872a304833e795d89"], &(0x7f0000000240)=0xbf) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="95eb4669209c7ff03119d743eaf90d22", 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000040)=""/250, &(0x7f0000000140)=0xfa) ioctl(r0, 0x8916, &(0x7f0000000000)) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000500)={0x3, @capture={0x1000, 0x1, {0x100000000, 0x888f}, 0xffff, 0x7}}) 17:07:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000008000000950000000000000035e708f69b322098b416b19994c09ff283e632a86e5410570b3151e83e60f390f7486f01bf80a9dc8121b403a1df7e6f987fb0ad9ec452b898f3375735f4ebe18b17482e263bcbe44fb52a72a2a017865dcefc7f77f67c6ff604ec57609f845d415d70a39ccb9ae4b4863ee42b169f4e5aa30201968e543e8ea2ffab5bbfa3e649068e90cadf2a20952e2bb68be5489a7400000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:17 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@initdev, @multicast1, 0x0}, &(0x7f0000000080)=0xc) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x200000, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000340)={0x18, 0xffffffffffffffda, 0x3}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xec, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r0, 0xe}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r2, 0xd}, 0x10) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x7, 0x9, 0xfffffffffffffffe}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={r4, 0x9}, &(0x7f00000002c0)=0x8) getuid() 17:07:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="0800000000000000000200000000d53d9472b4000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) signalfd4(r0, &(0x7f0000000000)={0x6}, 0x8, 0x80800) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00/\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:17 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x28, 0x26, 0xb, 0x11, 0x5, 0x7f, 0x4, 0x15b, 0xffffffffffffffff}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x101011, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000000)={0x0, "96945b81a886309e2588d91eb4b676cd9e5a504fe23c9d894fb597ee48501e6a", 0xffffffffffffffff, 0x1}) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e20, @rand_addr=0x8}, 0x10) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x1000, 0x4) 17:07:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000d51891609500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)='trusted{\x00') clone(0x802122001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:17 executing program 5: r0 = socket(0xa, 0x100000001, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001480)={0x0, 0x5, 0x5, 0x100}, &(0x7f00000014c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001500)={0x1, 0x7f, 0x208, 0x3, 0x0, 0xd5, 0x81, 0x1, 0x0}, &(0x7f0000001540)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000002b00)={0x0, 0x58, &(0x7f0000002a80)=[@in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x6, @empty, 0x5}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000002b40)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000003800)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000080)="f69b9ffa4074a128117ab6c4a7c4302a1efe859d98de0e8e50400ee8aa43c7941740275402c1edd676d2364dc2f2af9670ed970c58dd5acabc9f249d2016fce9e109925c3008df998f4daa334a8200673eed8ded9ab84cced6cce942f4e6988400297dba406e530b7922a192a16cc5065c84e7fe16f81f3462e1ba929224ae67cb249b6f1774ab5cfc44f1afe3c7d9424e1d85f457a4653643c77ea2ec388ac5825d279db5a22f1c7e00d128a4defabd271e5690732e228c2b87bf038f6b0ff7837b7d79f45328ad7a4576b158335bfa3ea760bd406c0d4687c139876b160bcbd0a6827aace615f60ff835118dfcc1a1721c1451697cabcb", 0xf8}, {&(0x7f0000000180)="aa9305597436539de25f101d3a598a8b9ba8cc7921433213c58b3a2b5a3c55aba17fe419bfedc75a42fbf13f93f0c4c4ccc6628a0cb5b59dcf1c812acd4fcd23c6f43c70ffacc2df6fe4769abc279a98dd46ba817f68f0f0af048a9a1c1a67d02244a9a941a3", 0x66}, {&(0x7f0000000200)="41b14f0d801538f3ced121a909026550dc1699415e59fda35242c071ff0ad421650eb282ef15b715447052c4167a5aec1c2baaca5fe6f2cb69296ddd346bdefe091fcf273608fddba8a5e0717d684a632f171b82a2d38a7308760ff5934d792e9d", 0x61}, {&(0x7f0000000280)="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", 0x1000}], 0x4, &(0x7f00000012c0)=[@authinfo={0x18, 0x84, 0x6, {0xebf3}}], 0x18, 0x24000000}, {&(0x7f0000001300)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000001440)=[{&(0x7f0000001340)="f31b9aa5c418847ff54442fb2cb895b05682813daed76bcf79cb482c7d20dd048f43de3b", 0x24}, {&(0x7f0000001380)="77d772ec74ddc594eabaedc4f91e24dc477e157f9239a4f18ef2c7ceac2507215a85f96256d6b998cc52257bf107697634d9aa2b87774d2897c65b6d3fb96f1c384db5efacea53be5f1297ed877ff8519946b1a7cb26786a92a55fcda13cc3180b237064d2b2fc4393b75b95fb16ae864c704cd7613ca68e6b806ed424fd843e99889efd4bb94dd912b3157dd8796061449e9eaeeb0a5dd272f7dd768dc67b", 0x9f}], 0x2, &(0x7f0000001580)=[@sndinfo={0x20, 0x84, 0x2, {0x944d, 0x2, 0x8, 0x0, r1}}, @sndinfo={0x20, 0x84, 0x2, {0x82, 0x8000, 0xffff, 0x4791d685, r2}}], 0x40, 0x4001}, {&(0x7f00000015c0)=@in6={0xa, 0x4e20, 0xff, @empty, 0x1000}, 0x1c, &(0x7f00000029c0)=[{&(0x7f0000001600)="6e93cc837c31756e84f0c409a355335a840a8e767e02ada3144b31471b85d6f1d9b434efdd9ac7b1f7272ed99ca3f6244439d906ee17d08f65dd68764fad6f643e3babe2be462b000c7ac751dd2432b7", 0x50}, {&(0x7f0000001680)="9915519969a0551cc5720b5b87cb4096970efcfd2fd28ec4f5495e7ded644e66841375643e6d944ac8ea6a5674117264", 0x30}, {&(0x7f00000016c0)="5c4a55ad08f2bf59e687527a85b36f94a51c132679976279b63a934451ac12b9486c4a6366fa1cf1df59544582866b5e8574fb2761d711a07904bb36e4475a4df5088c7f3b07664dd7b31274f9a8e302dab0bf2bf6f7", 0x56}, {&(0x7f0000001740)="a7995024fb6a0f14af27cf4e16caa6b7c72cab44cd032f181d618ffe26a656243e8e73e46cd4cd33884861757c9558c6a4", 0x31}, {&(0x7f0000001780)="14affa5153721433a344c516d2d25c7d7beb5bc7418ece39f6413aa9b33958c9b382163eb840e9eefd86c1aa187fc9323c5cc4d1695bb803e4685716e59817e6d66a35935497d2d5359197934ff0d8872046ffa458c8b2ed094cf204ac2011", 0x5f}, {&(0x7f0000001800)="357568c177ee9197862295f987bfcb56c571a7d224efdfc30119ddc182bf3c47f9fcebb6d61bdd17bcdd2420da1982ff28e27f2fc73cf770dbd9177e32e3ff971d161bde4141dd87e26d78641c7a07b0c1a2d7be58f068b5df62fed61ef46340e84177", 0x63}, {&(0x7f0000001880)="75ba755bf331f8e11a7b", 0xa}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="bd1f699f52e4aa09691072abfcd7016f41c4ce037c751ec76ba717de010958f58a688f4e4c959890a072ecb22b18e7d35ced87e1597b76500b118899dfe8be8eb4d43fbf81cea0216e483d890d9ca306c3daa46f6b473c6111d2ff8ee2d8fd97357d7fca182bd89c0a565ad8028f2d0a141f42225a0c2b915b03dfc5cf77be9cc2af7f887f94396e9c0589e091074589e23c8f33527d6de98dfd157110b1542b556eb1c9099ff3b090993a71a0dedc511aac626dad7610a9f29c7c9a5e50a98083c37b86aebccbb86b658229af336a7e5176ee58b5be9e072c0e77301d126bb7f65d92343c", 0xe5}], 0x9, &(0x7f0000002b80)=ANY=[@ANYBLOB="18000000000000008400000000000000b200cc9007000900180000000000000084000000050000002000000000000000180000000000000084000000060000000900000000000000300000000000000084000000010000000900020004000000e309000001000000010000000900000000040000", @ANYRES32=r3, @ANYBLOB="5d42e86c00000000840000000500000020000000ff00000018000000000000008400000005000000000000000300000018000000000000008414260000000018000000000000008400000007000000ac1414bb00000000"], 0xd8, 0x4}, {&(0x7f0000002c80)=@in6={0xa, 0x9, 0x6, @remote, 0x8}, 0x1c, &(0x7f00000031c0)=[{&(0x7f0000002cc0)="c6669220e4f922f2a19df769b173065c8ae1dcd3c9167e309192ac6e24483d39df2eef3eb2ddf3b2cb4e9508c30d6839f7356d5e609e492b87a6e3a6c8eb98aa633b460008ecef8f907f4c9d56741078799449f852e857674222d96b89530cf87f52dbef1f0449aafc34dcc14be37a2eec0eeff27b9fec02ccd78c30fd83110b1a5fb0375289e96c947b5e6482cb60bebbfc698e6ec2227585600d44023c708eb236968e94a13360bb4c839ff158e0944fe9ff6318603b4443bcca", 0xbb}, {&(0x7f0000002d80)="55c1ec830c870f54873634519aa2cf68975ad04d9dbdf27034769a670d0f7851ecfec79aef257c53e5228b1afff48c819f240e", 0x33}, {&(0x7f0000002dc0)="7a022528fd16390c7a2ee1d8534053b3e8e42e5012af0497f95a24", 0x1b}, {&(0x7f0000002e00)="939c35033b444caec888c5b453cc2c01a07996789507b025cb1b0b2ad21dcae7737821ef6c270449bc7f96c022d94aa98999b3cf4f1234269a94376225094a4118971bb54f5d3d0690f58ff2f1aad6c93dca7b1663", 0x55}, {&(0x7f0000002e80)="ee92d6efd536a8b3bd5a4095f3a25fbbd3e3ee595aab4cff7aa6e8d832213e0759c64b84a5c0c4e1f41fe3b01be8e800a08becce8a92fc918733fb5487ad6f88751fd7dad7a243d6514c80a593afac7906a89805d45eec44025419146fb458937adaac44f6a6d62ac20fd4af0ca49a074bbfa65e49e7a5f3b5e01d32d83e871cc7d25ac05d858b707171ef3ebc4dfb21a1486275d5b12203c96a88bbc86cd4f574c54b5d195b8ce5c53eabd1cceb5224dffa41a0ff5af4a6eb1749ca4427db0b1c08ec2a9c05fdc3ca1e1ff982e1668244047da52c2949df9e9bf9da803b23afb21860df328b2f665cf1483ac9d43e2f159e5e9c1dec70dd62fc903da7f0", 0xfe}, {&(0x7f0000002f80)="4169964f7b8bb29d07e0fa46f570c26d12db1429b56497f16f373448bef1f5c496f1569352e1ba5ddb443103b9c722ae21b2e32e09fb0ae2fc0cd340ab68359df700fc460327468ada1c53bcc9d049f3ff73e4d356f41fc57150ca4f8fe3883a528b1334c06cdb377df306173c8be5c3", 0x70}, {&(0x7f0000003000)="50110687611598be1ca120f86bce8b061d05e40f8124a340a75d9f9560ca0fca4e0fbc22ff0613239f789a7fc193a14309259b2266e2cbc3000c299eb43df8a11f05de996cd4933207013cedc6ae62d9facfa89163de887e41df8ee81b9459d92963a0ece84772051c0dfc6576d1861cca3a1c18fb199d1e027e515dbc2d4642b886cb821a45d5778adc8342c60ef983dada41047a9700cb81f49fc2bc35f5bc627c7d2c2b347f7601f71b3bdd793dad31f49cd810125ea45b4c08ad74", 0xbd}, {&(0x7f00000030c0)="30defb6a5311aa944438e062b6e583d7ed794a14", 0x14}, {&(0x7f0000003100)="5b307db2f82a2deaf1a71ccd651005f08031d1c8bedbcaef491a7b09b2790607436caf4bb66b29ace5be81bfe7811f5625275644e4ab0ffd037e14f2faa645c6b4a704a1c184579c169919976b427d792aee17e515b538a4e66c91e50e6e7faca6d34bf1a027599875a1f5699d7680f63b77589fa4786081ef48f62fa0a94184a0d7a20888ad6c0dacc0a0c25e72811060bdc9fc56bb7554b65eb5d4115ed8852f53182f9eaed9465bceec3de68383d4668b", 0xb2}], 0x9, &(0x7f0000003280)=[@init={0x18, 0x84, 0x0, {0xe3, 0x7c, 0x7, 0x200}}], 0x18}, {&(0x7f00000032c0)=@in6={0xa, 0x4e23, 0x6, @mcast1, 0xffffffff00000000}, 0x1c, &(0x7f0000003740)=[{&(0x7f0000003300)="7409ecdfdf7efcbac5d539899f5f44585b9c4b74688267f5011482a1c45e56ac10323b594c2ab2223994c3396d33cf6b6cf1003775a19435d1b6de", 0x3b}, {&(0x7f0000003340)="12fb21b13a4f025da40f4d5d7f3f389f3b1dc2c65159dfef78f2065ef32c0c7a1fd5f7b318065f0f393fb88454e21ac06021465fd035f4be60d914281c773d61b0ab7fbe4afb36b6d32cf2b36ccd360ed1a11a6a860e78033d631cd61ed1004e7d91b642ffa042f79b735639732ab2a4b0448215c2b8be5c5e5c20ca40a3c6", 0x7f}, {&(0x7f00000033c0)="1871fb24a7ee97f0314f1d5080690fa4c84f46d572b47628021ba9aa657bded76555f71da39ecac7119fe1a9c88660e50ca341a32481451b50248389f5624c288ebd514a0f54cdf130c677e9a4f393cf541227ef5e31dcb9e80c17f20f6be25e9d3113d651ecc52e04fa985d7b0662d04411febd4debed6f582e5025b5ea5ffa9fec67012e90dd72ae0e63100c9b58220d8055959c0a0b1969a471af1e340a8e2e6d5b9592bf522fd78a36e0a5578ec1d3a90e49841207646ca276fbfee725712737df0207bd7d3ca3037237f247132ab18602b6", 0xd4}, {&(0x7f00000034c0)="3f559f992b4ef6f553c0708fae64bce8e97219d99ce6f34924d77cf6a6a5e3b81fcbf24f0d444910f3c1fb40b0cfa4721395c4b1ad34ab294554c417cf70998ebf49cac4bf45ea068524bf8abe2e1258ef88840bf1a0951c8718eaf5cec0ab2778341e4ba24a8be4d3671c04fe", 0x6d}, {&(0x7f0000003540)="0091a5dbe13ec973aa0014eca5623ef37bca762246d5e2da17522979b3c6d1f7fec1736cb4377afca424b3d475b4524f0136b3f3762cfd337d94a556f11a4da7b718b7bf1285f532aa46cdeec069a8f01dcdcd783a8be0d7cc2bfa5f351499c5d0eea32d110f628c662b7ae1c317fab55344592bfa3efc049ff40f025a73363440f82fdce32fcd529263276e55a49bf34ef2821c71b6054235dbecd604144f91ba9dd4dfd1cb8a13b71911ca6e9dddaeee476645e61606c940d7f08256b6de2371a320d569cda46a57529231356f2f7d863cb23cee0ee5", 0xd7}, {&(0x7f0000003640)="9ec04e86", 0x4}, {&(0x7f0000003680)="73b698fbcd178b21efabcd03c16b7675c5a7550b3f1d26d2c9188a37c65b1f7db1a848fd47facf66e829d4c25bca7df7cbd248a1fd159d8c1bfc389493fa2f25cae8c6a3afe487a36699feec673dfafa1a6a1dd12f155162f91bd177147f1960a1185dbbfc8de23f21d6497b726069f7dc9b40b474d11ec1679717fe14369920e4", 0x81}], 0x7, &(0x7f00000037c0)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}], 0x38, 0x90}], 0x5, 0x4090) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00H\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000eadd000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000100)={0x100}) 17:07:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000716e2ed2df571cb6bcea16413136958436958d2d206f7f7a3207a062369d189070edff5002"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10440, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000180)={0x43, 0x9, 0x2, {0x9, 0x1000, 0x4, 0x6, 0x0, 0x5, 0x1, 0x1, 0x8000}}, 0x43) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x0, 0x1, 0x59, &(0x7f00000003c0)=""/251, 0x5, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x11}, 0x10) 17:07:17 executing program 4: clone(0x880400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00\xd9u\xa3,\xcf\x12+g\x13\xae\x8f\xbd\x8c\x05\x848\xa4\xd9\x88\xd6\x94\xde\xe8P\xed\x8c\x9a A\x87N\xd2gW9\x83T\xbc\x82d\xad\xfc\xebm\x9a\x86)\xa3\x19<\xa54A\x04\xfc\xea\xf8\x81\xdd\xb8dsi\x9b2\xf1\x9do\xd7\xe2\x14=\xaa\xd0<1\x94,\x05\xefm\x8c~UT\x15\xf4T~\xd3p\xbc\xaeK;\xdbR!`\xe3\x82\x1b\xea!&;K*\xb9\x9c\x18\xcc\xaa\xac\xbe\xe6\xff\xff\xff\x7f\xff\xff\xff\xff\xdb\xb0\xf6(\x98\xb9\xb0\xd5\xdb\xc7\xa1@\xbf\xd4`', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x9}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:17 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x400081, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300)={0x0, 0xfffffffffffff000}, &(0x7f0000000340)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x20, 0x100) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000180)=""/156) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000100)=0x1e) accept$packet(r0, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c00)=0x14) bind$can_raw(r0, &(0x7f0000000c40)={0x1d, r3}, 0x10) 17:07:17 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x400000) fcntl$getflags(r0, 0x403) r1 = socket(0xa, 0x100000001, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000000c0)={0x81, "2f07546ad0f3831c200ce1e6f1c36a4c917f5932bfa955e98e9f443cff8841fe", 0x2, 0x20, 0x1d15, 0x1f, 0x4, 0x3, 0x8, 0x80000000}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) accept4(r1, 0x0, &(0x7f0000000040), 0x80000) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl(r1, 0x8912, &(0x7f00000001c0)="f74d7fedbba847e0604a5c25d5b59c4961fa9db77d7f7ee87c1ed5543c7a3d08b16496078b8cff073502555806b08f5eef142149bacdb67996e5de6cb40585ffdf5f6d4152e3a4341f61ee07e4") ioctl$VT_ACTIVATE(r1, 0x5606, 0x180000) 17:07:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00L\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000011600000000090000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) poll(&(0x7f0000000000)=[{r0, 0x22}, {r0, 0x2020}, {r0, 0x8002}, {r0, 0x300}, {r0, 0x200}, {r0, 0x8000}, {r0, 0x2052}], 0x7, 0x8c9a) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000010009500000000000000c4750800000069f6cc8746c18ff9cadcd4939b6d8754b348e38dfa79754ee157c515e3d063928dc9a0baf117457cc06cddd7c795863e10640400ae002e1d9b49df06000000652011b119d4f58e5a2e9c54ad79d7b65b954794abb065a405c55dee"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:17 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = dup(r0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x8f0, 0x1]) 17:07:17 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:07:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000009194e16f4ce5772a7ea0d2e051cfda4535eafa3d2c67eb1f1a722d4ac34c6e7ead1648bec77e7d66a25806d3ba1a3686b783aa6feb48ae98ed3eb3c83a078956bcd0eac4675b5b56444d0ffca8c0"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00h\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000ce0000000000000000d3c0950000000000c400"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x80000, &(0x7f0000000340)) 17:07:18 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) dup3(r1, r1, 0x80000) 17:07:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc000, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x400000c}, 0xfffffffffffffd26) 17:07:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00l\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:18 executing program 4: delete_module(&(0x7f0000000000)='wlan0\x00', 0x800) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2000, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0x1, 0x4, [@local, @remote, @broadcast, @multicast2]}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x9, 0x7fff, 0x1, 0x8, 0xffffffffffffffff, 0xfff}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001880)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001980)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000019c0)={0x1b, 0x7, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001}, @map={0x18, 0xa, 0x1, 0x0, r2}, @alu={0x4, 0x4, 0xa, 0xb, 0x8, 0x40, 0x1}, @ldst={0x3, 0x3, 0x1, 0x4, 0x0, 0x18}], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000700)=""/4096, 0x40f00, 0x1, [], r3, 0x7}, 0x48) 17:07:18 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffe1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5e6c3ee}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa614}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xea}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}]}, 0x80}}, 0x1) 17:07:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000fbff420c70d1ba67e46c990000264b05342ee02615bf13c4f3da56f41cc2c2cda4e2cb2817bf3ee3229292a5ed55f929cd2c4f3fa9b6003116444d04b32aa63a594bf9ae1d85b5ddc2ae552af347529bd71acb8afb02f6df77735a10128a293215581a701e1965389d7684cc2dbacd6941a0addac93f646b9c00f0723d5c0a88a5e5e63a27167d4fee4b61cfc3bf90da9bd91d2f8e46505bb05e8422187b049e3aacecd77328adb3beb65446062f35e88f2ec6825e77af902d27a40ddfc77606898196c9db1e2ad9ee"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x3) 17:07:18 executing program 4: nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'nr0\x00', 0x6000}) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) write$P9_RGETLOCK(r0, &(0x7f00000000c0)={0x45, 0x37, 0x1, {0x2, 0x3f, 0x1, r1, 0x27, 'selftrustedsystemkeyringeth0@.security}'}}, 0x45) 17:07:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@loopback}, &(0x7f0000000080)=0x14) 17:07:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00Am\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:18 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0xf0, 0xf0, 0x0, 0xf0, 0x0, 0x218, 0x218, 0x218, 0x218, 0x218, 0x3, &(0x7f0000000080), {[{{@ip={@local, @local, 0xffffff00, 0xffffff00, 'yam0\x00', 'veth1_to_hsr\x00', {}, {0xff}, 0x2e, 0x0, 0x6b}, 0x0, 0xb8, 0xf0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x4e, 0xc7, 0x6}, {0x8, 0x4, 0x2}, {0x1, 0xa9}, 0x4, 0xfffffffffffffffd}}}, {{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0x17}, 0xff, 0xffffffff, 'bond_slave_0\x00', 'ip6tnl0\x00', {0xff}, {}, 0x88, 0x1, 0x5}, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@unspec=@state={0x28, 'state\x00', 0x0, {0x9c}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x10, 0x80000001, 0x1f, 0xfffffffffffff000, 'pptp\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x40800, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000100)={0xf, {0x5, 0x1, 0x0, 0x5}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x1}, 0x48) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0xb52, 0x32, 0xfff, 0x6, 0x68360f7e, 0x3, 0x3e, 0x8, 0x1e4, 0x38, 0x97, 0x448, 0x0, 0x20, 0x2, 0x22c, 0xbf76, 0x7fff}, [{0x70000004, 0x0, 0x8, 0xffff, 0x6, 0x10000, 0x200, 0x884}, {0x6, 0x7fffffff, 0x0, 0x6, 0x8, 0x2, 0x1, 0x9439}], "955e860b003dbedd46cbf6f8376f7a8d493160af3415f734dd6e5bbb15e870d6a711bdab7b68d6e70d0b3ada0da4980f66340c4256f3b7c9356dfc62ca73edf067d0736f16d5", [[], []]}, 0x2be) 17:07:18 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000300)={0x60, 0x0, 0x5, {{0x1fd, 0x3ff, 0xfffffffeffffffff, 0x9, 0x6, 0x3, 0x5, 0x1}}}, 0x60) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="b3a90d00000000000c0000000002000800000b00bde600000000010000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x800, 0x40) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000180)={@broadcast, @multicast1, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0x6, @local}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x1000, 0xf2, &(0x7f00000004c0)="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", &(0x7f00000014c0)=""/242, 0xfd}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:18 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8784, &(0x7f00000000c0)="608078cbfc4f70877440373783564706e6f45985e4d0ada5c1a0a6d76b9fc8e0f6832026f2be3cb90fbaa633d2cd875e82cd5d34c89d8521bdd4820d3ae99c7f9d912d974b7927b489f5b0783d870de2296e851581cbda6a960444e39b6ebae28798b536cf2cae5bc70c1c76781b89225c0d2f75fce48289469ff905b81be81cf411abaf3db5ee0c551bff27d77e3051cd04382718bc7648443e72b9cc51363f05dfcaae27a2b072abff67e47c51457010c339126e7b38") 17:07:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x1000, "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"}, &(0x7f0000000080)=0x1008) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000100)={r3, @in={{0x2, 0x4e20, @rand_addr=0x2}}, 0x3f, 0xffff, 0x7, 0x0, 0x5}, &(0x7f00000001c0)=0x98) 17:07:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00t\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='attr/keycreate\x00') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r0, 0xd}, 0x10) 17:07:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x4000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 17:07:19 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000200)="0cec1fa0a80183acd70463b929c497f4e251a8a87a458d8aabb3f2c672bc6512ade3622c7773a31717017f171c079c403612bfe87bdf0ad2807af0ad461578fd945fdb7525a06d9de0f009cb13795572cf75e24459bef76e4654d91089ae1122820d84f07979fb9950085c77bfcd02a631c510ff2b6dd4b5941ca60545c810a13fd3151b318d8df33572ba60fcc1fe3cfaf2a137719ea985ea4e5b1a075da004724e36b3f39101c317bfdf80b211c3c5c7a971225a8cae9817c953f8ef377a3d3eb61480218539") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x6, r1, 0x1}) 17:07:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000fb5bdab2dfccdc58b3d68e7286306fc14bcafae4564c687472f52c72ac73b7d17cb1e462fd469c0eef6d48c9ddcb45f1eef2ebd7154698dbd2017a2e54fe2adc68cf8cb39bafb5d78067688d48522cfb1345878ce6188a964270e75dca69b87a97f6d06c60983fa3583b6e96f12c39a46d373834e649"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 17:07:19 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x27, &(0x7f0000000100)={0x0, 0x3, 0x2, 0x7f, r1}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x58}]}, &(0x7f0000000000)='GPL\x00', 0x1, 0x9e, &(0x7f00001a7f05)=""/251}, 0x48) clone(0x2800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00z\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) getpriority(0x2, r2) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f0000000940)}}, 0xc) 17:07:19 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = dup2(r0, r0) mkdirat$cgroup(r1, &(0x7f0000000540)='syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000580)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f00000009c0)={r2, 0xffffffffffffffff, 0x8000000000e, 0xffffffffffffffff}, 0x10) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={r4, r5, r6}, 0xc) 17:07:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000aac5d245f6f5f3c6cb1d858e2e1f88453e2321237ada89950f1432304eed360b4e6e011397f92de78537cc96ede0d5bcda0c057806bf4a2c4f6bc0207bb2da288c4fbbeaf4fe6ce55d29f215ff8ed2bd3cbd63d94d58894ac331f25cb9b19187e9d816a3661ce742c6bbe3b691eb8177dc701efc92347e9990b89e1ae40096e8d2fed6a02c43"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@rand_addr=0xfffffffffffffbff, @in=@multicast1, 0x4e22, 0xff, 0x4e24, 0xffff, 0xa, 0x80, 0x20, 0x1d, 0x0, r3}, {0xffff, 0x1, 0x4216fe6f, 0x20, 0x800, 0x9353, 0x20, 0x3ff}, {0x5, 0x7fff, 0x9, 0x1}, 0x80000001, 0x0, 0x0, 0x1, 0x2}, {{@in=@multicast1, 0x4d4, 0x3c}, 0x2, @in=@local, 0x3507, 0x4, 0x2, 0x4, 0x100, 0x40, 0x6}}, 0xe8) 17:07:19 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @loopback}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x4, &(0x7f0000000040)=[{0x1, 0x5, 0xf16, 0xffffffffffffffff}, {0x8, 0x8, 0x100000000, 0x9}, {0x2, 0xaff, 0x7ff, 0xfc7c}, {0x4, 0x4427, 0x10000, 0x9}]}, 0x10) sendmsg$can_raw(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000000140)=@can={{0x2, 0x4, 0xffffffffffffffc2, 0x2}, 0x5, 0x3, 0x0, 0x0, "15d6f692eb34e725"}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 17:07:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180ea7f2de1d00256bc0efa4328400d6b100000000400000000000000000000095000000000000009616d6d76666dacd48217897e378d53e77677780aa865020bf44c9fd5499"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x1, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:19 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x30000, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000080)={{0x2, @addr=0x2aa}, 0x8, 0xfffffffffffffff8, 0x3}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x10, 0x4, 0x7, 0x8, 0x7, 0x2, 0x7, 0x8001, 0x4d, 0x38, 0x23, 0xfffffffffffffffb, 0x10001, 0x20, 0x1, 0x60, 0xffffffffffffffc0, 0x2}, [{0x0, 0x4, 0x6, 0x3518, 0xffffffffffff2a89, 0xc4f3, 0x8000, 0x2}], "cdbcf5d5129f6774143bc4695aab1e818fa4e076a6c5dfbcdcadb8d0ec9c579058cbda39a5993e958104ede5caf2e798e5993137649b0c99866496b98846d6dc61c0aceb25aefe52eb1ed0d162506f", [[], [], [], [], [], [], [], []]}, 0x8a7) 17:07:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x80\x01\xa0\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000002c0)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) sendmsg$tipc(r2, &(0x7f0000000640)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x1, {{0x41, 0x1}, 0x4}}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000100)}, {&(0x7f00000002c0)="96cb7b1cdc52ea80422b4a06c37d21225fb372b747d46f42e87aac69870942074191e360258fad6f5597e6285ad80e944cd19cbf2b0ba6221b5dddd75db9a592ddbf99d8f3eda9342c72b084977306f7b9a09b2e3da4340a0077d38845f9e018f0b634900cd8226d4a5f00036404dc10e26e5477cc74e2ea0600a4364324879713de4bf3632d215d3efed62d83862bf2cb05fc4f25d67d36878940acc2f6dbce06f03947893914eac33402781d7f95f1aa7fb21a65a2993d6e9088896eb2bf04e323", 0xc2}, {&(0x7f0000000140)="de101473453af183c3226e335cc48fa7ea71bd9f1c93f20cc854975a7ac0910673955f", 0x23}, {&(0x7f0000000180)="0fcda82930046a9f05c633f5cf5f373731b74de08b51ab599570001fb6bdda659daa937ca65e84d6662a157ca26ac3a4b7", 0x31}, {&(0x7f00000001c0)="547c913d0c96e4ba1e895a8f2a650c045842b86a8770856ed5c0d4ee9d48f14242a5601631d28e79ad3ff315bf2eab", 0x2f}, {&(0x7f00000004c0)="567c8634c95266ebceb4a249b4057525680a277f453ee7d30f8c35ea15accf", 0x1f}], 0x6, &(0x7f0000000580)="5a64bd1920de19277fdaf0fa6b968802efd10dfe8efc2e8cc70250513bf3aa5432ce72d70356ed54fd27b4533aa24d39f6c06eefa57bc0d3b985e39a34254c5f0add966e98aa028255aa874b1a121ee89c706f52cd3834b838fdd80294a0c2f472b03d92327d3e8af0b3bc4dc13fa4e4de411c7442b50daab317b6bb19765fc1f5a831f75479fb4262331b4a9e7858b64998a62bfa1dffd92fb415f2", 0x9c, 0x40}, 0x480d0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x2d3, 0x20502) r1 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@ethernet={0x0, @random}, &(0x7f0000000340)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000500)={r2, @in={{0x2, 0x4e23, @local}}, 0x3, 0x1, 0x0, 0x3, 0x8}, 0x98) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000180)={0x3f, 0x1, @name="4c4017f18f376cdc2dc6b6fffd880ca1bbee864fb67d7d56691bbb4301c9b97e"}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000200)="9b4e9edf9c9236f81ce3c9072dc812e9", 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:20 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x4, 0x7, 0x3, "41d51268712b2c6cb4deb3b38a8bc3274033e766dd1a9d05ca07aa02b7e0c79d", 0x7975774f}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:20 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000040), 0x4) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000000)=0x9, 0x4) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000080)=""/3, 0x3}], 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:20 executing program 4: r0 = semget(0x2, 0x4, 0x84) semctl$IPC_INFO(r0, 0x3, 0x3, &(0x7f0000000000)=""/4096) clone(0x802122001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 17:07:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\xc0\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r1, r0, 0xd, 0x2}, 0x0) 17:07:20 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0xd070ae569bccb966) msgrcv(r0, &(0x7f0000000000)={0x0, ""/166}, 0xae, 0x3, 0x800) r1 = accept$ax25(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'ifb0\x00', 0x7fffffff}) 17:07:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\xff\xff\xff\xeb\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:20 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000003500009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:20 executing program 4: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x7fff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000002c0)=0x4) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x8, 0x100) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000240)={0xb0e, 0x41414270, 0xa0ad08296a5fa3df, @discrete={0x200, 0x8000}}) 17:07:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095fe12ced7db0000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) 17:07:20 executing program 5: r0 = socket(0xa, 0x120000001, 0x7fffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\xff\xff\xff\xfe\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x47b, 0x8200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000080)=0xe8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000002c0)={0x0, @reserved}) socket$tipc(0x1e, 0x5, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="49000000000000000a004e2000000020ff020000000000000000000000000001050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000060000000a004e210000008100000000000000000000000000000001faffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100000005fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22000000030000000000000000000000000000000102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000001ff010000000000000000000000000001a50300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100010001fe8000000000000000000000000000bb01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000001fe8000000000000000000000000000aa7f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x390) 17:07:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="60b8056ff7898082ffff19ffffdfff0095000000003b0000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x01\x87\xd1\xa7T9\xf7/oz\x95\x7f\xdc\r\x1b\x86\xc5\xf2\x0f\xb8\xeb\xecZo\x00\xf1\xb2\xa0\xce\x8c\xe9\xa1\"\xa2\x84\xac\x92\x12\x9e\xeeO\xcde\x80\xbf\xc2\xf5^\xe8\x04\x9b\x03w\xa7]\x1f\x87\xe2\xbe\'c6\xce\xf9\x9c\t\xb0k\r\xa0\x9c\xab\x82\x97m\xddQeC\x83\xb8\xdbu\x0e\x1c\xff\xd3\xe2\xc9\xe5\xf7\x8cN\xa3\x16\xbae\xd3 \x95', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x3, 0x4000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000180), 0x4) 17:07:20 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x183141, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0xec, r1, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x32bf65c0}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x118}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x787}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff734}]}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000060000000000000000000000009500000000000000da4159bd6d9d2767ead16074b0ef951dd4591a06d017a616409937a1dc76303ba95c07463ac7f488c7f9834cc9eaec5652fe77c2f230822e9d334a62b246fd89bd25fbc37749f8e8a5a156739eabc4d034c29bae12b4e1703b55ac71049d8729b47063d9b121db926ff7a135509597331699661225b038dbfa0cf4"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r2, 0xd}, 0x10) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000080)={{0xe58, 0xfffffffffffff133, 0x7fff, 0x5, 0x0, 0x7}, 0x40, 0x9, 0x100000001}) 17:07:20 executing program 4: clone(0x20900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:20 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000080)) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\xeb\xff\xff\xff\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:20 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'gretap0\x00', 0x3}, 0x18) recvmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000100)=""/141, 0x8d}, {&(0x7f00000001c0)=""/198, 0xc6}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/243, 0xf3}, {&(0x7f00000013c0)=""/85, 0x55}, {&(0x7f0000001440)=""/1, 0x1}, {&(0x7f0000001480)=""/155, 0x9b}], 0x7, &(0x7f00000015c0)=""/74, 0x4a}, 0x7}, {{&(0x7f0000001640)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001780)=[{&(0x7f00000016c0)=""/141, 0x8d}], 0x1, &(0x7f00000017c0)=""/74, 0x4a}, 0x1}, {{&(0x7f0000001840)=@isdn, 0x80, &(0x7f0000001a00)=[{&(0x7f00000018c0)=""/156, 0x9c}, {&(0x7f0000001980)=""/80, 0x50}], 0x2, &(0x7f0000001a40)=""/210, 0xd2}, 0x850}], 0x3, 0x100, &(0x7f0000001c00)={0x0, 0x1c9c380}) ioctl(r0, 0x8916, &(0x7f0000000000)) accept$alg(r0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xcd) 17:07:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x41000, 0x0, [], 0x0, 0xd}, 0x48) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000140)={0x101ff, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000d700000000000000001000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='n\x02\x00\x00\x00\x00\x00\x00\x00c\xc3\\:Q\xf9\xc1\xf0\xff\xff%\x00Aqz', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r1, r0, 0x1000000000008, 0x1}, 0x244) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x9, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0xfffffffffffffd94}, 0x1, 0x0, 0x0, 0x40000}, 0x84) 17:07:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\xfe\xff\xff\xff\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x400, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x101, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000580), &(0x7f00000005c0)=0x4) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:21 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) getgid() setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x7, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="181d7972090016fae24b86f88ce0a2146c1aa59500b400000000000000d071a2a01b924b2200000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000002000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000c3000000478171093d784bd28ad32d002000130500e54f72ecf115d9c68301038782c607c97f702fb77192bce713b4c880f41ab2847969a80ee57b7f52e624d5948e78cbe6a708ea1ce807ff1ea8ce4ac369e85e0600b514bc11d26fab6de4af725b7a6f9654cdd35cc603311e5b5c12fda1a8c5947411a934cc5295a42d910b8d263ab0030bb4e9"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) clone(0x4080400, &(0x7f0000000340)="79381ee542de0a640c8eb1008ea4b01eec15efeff0e2", &(0x7f0000000300), &(0x7f00000002c0), &(0x7f00000004c0)="2e1e46a0b4403f12f8c9fdbac0ad7d4dd6980be45cf31bb78f9c4dfbec2bf40e66e9520ebdb778db49ae6f90a599a324d299b325652a9d3f7a9c6c6bbc3ad973f83a1c6f3ea52c233e8139c66b6d6604c867bb5f0e81ef142b366fb53bf53564fe6c1c68fd17799b96820ed966659cf7c906cba641fe27540fc97d4221b9a41d322d632083d19550f060de6e5ffae4b4bc8e109937c62d5fb3e09cf54a5a1f1811db662dc4b8c7bcdd015689b6a24b86c983067b77a0c4158e0fc1ffd5e4a0a885") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xe, 0x3}, 0xfd9e) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x02\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000080)={@multicast1, @multicast1}, &(0x7f0000000100)=0x8) 17:07:21 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000007c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)={0x18c, r1, 0x104, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x170, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8, 0x6, r4}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20008000) r5 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x4, 0x101000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f00000003c0)=0x0) ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f0000000400)=r6) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x4, 0x4}}, 0x26) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000019500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x5, 0x2}, 0x10) 17:07:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x04\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000009400000000000000109500b40000000800b5c5ac0226ab083264b6fa2bd57b5598b29623c424b5f3587a829851eaf5127354a7834a89ca8ed15d549e46c34e9661797eb4ffaf64d397ae883d8815bd6818a0ff50d22f2d000d0668a6d661180e46c39e92458a2aa7a1c60b57287a7afffabf6cc2873bbc8f6dd1adc033ceb8dcbc16b5b59157ea20735987af09827b8cbd2a08d712a6626168d7222c9dbed04a796eef7c7edaecb0b20f8002a7e8768fe648b85714a5231277827fcae2dca2bf5db8f72797738e5c"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)=r0) getcwd(&(0x7f00000004c0)=""/4096, 0x1000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000001580)={0x0, @motion_det}) 17:07:21 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400003, 0x0) ioctl$TIOCNXCL(r1, 0x540d) 17:07:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x141, 0x100) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={{0x40000000000, 0x6, 0x1, 0x9e4, 0x8001, 0x3}, 0x5}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x10) write$P9_RLERROR(r1, &(0x7f0000000080)={0x13, 0x7, 0x1, {0xa, 'syzkaller\x00'}}, 0x13) 17:07:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\'\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:21 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000180)={0x1000, 0x800, 0x334b, 0x7, 0x9}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) getsockopt$llc_int(r0, 0x10c, 0xf, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xffffffffffffffb8) 17:07:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback, @empty}, &(0x7f0000000100)=0xc) connect$can_bcm(r2, &(0x7f0000000140)={0x1d, r3}, 0x10) 17:07:21 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10001, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:21 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = semget$private(0x0, 0x3, 0x340) semctl$SEM_INFO(r1, 0x4, 0x13, &(0x7f0000000100)=""/146) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x100001}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) accept$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@rose, @bcast, @rose, @default, @netrom, @netrom, @null, @default]}, &(0x7f00000000c0)=0x48) 17:07:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0x17) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x0, 0x2}, 0x288) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 400.238170] QAT: Invalid ioctl [ 400.250286] QAT: Invalid ioctl 17:07:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00/\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095fe00b40000000000d9a5a4b44221de90022c71af2dbfc0f80b347ebbe582b031cb122876e6d196547ee886a57fee7a91194d3b8e2afcf9be78e13e524a592c2e635076193aa7f98a4f7c547a9728ae44be321d253eacaae6eeb10cb2faa408d430"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = dup(r1) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000540)={0x7f, 0x8, 0x1, 0x9, [], [], [], 0x1000, 0x0, 0x9, 0x100000000, "0822a37811390ecca99e25039c5f53be"}) r3 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000140)={'nat\x00', 0x0, 0x4, 0xdf, [], 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], &(0x7f00000002c0)=""/223}, &(0x7f00000001c0)=0x78) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) 17:07:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500009c07550fa9e309d8a635fdc4a5b1e2a70000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 17:07:21 executing program 5: r0 = socket(0xa, 0x100000001, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:22 executing program 4: clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:22 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x440000, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000002c0)=""/255) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00H\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:22 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x6, 0x204240) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x80000000, 0x4, 0xc1f, 0x0, 0x7fff, 0x20, 0x5, 0x9, 0x7, 0x6, 0x5, 0x0, 0x4, 0xffff, 0x0, 0x5, 0x8, 0x4, 0x7ad9, 0x7, 0xb1, 0x80, 0x77, 0xfff, 0x8000, 0x5, 0xfff, 0x0, 0x7, 0x3ff, 0x3f, 0xf454, 0x4, 0x7f29, 0x8, 0x0, 0x7, 0x2, @perf_config_ext={0x3, 0x9}, 0x1, 0x6, 0x7fffffff, 0xe, 0x8, 0x1, 0x1}, 0xffffffffffffffff, 0x6, r0, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x1, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x41100, 0xfffffffffffffffd}, 0xfffffffffffffef7) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xd, 0x1}, 0xfffffffffffffdb7) mkdir(&(0x7f0000000040)='./file0\x00', 0x24) 17:07:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000700000000000000000095ffffff3f000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00L\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0xc98137a804812cab) recvmsg$kcm(r2, &(0x7f00000009c0)={&(0x7f0000000180)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f00000004c0)=""/225, 0xe1}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000200)=""/27, 0x1b}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000740)=""/237, 0xed}, {&(0x7f0000000840)=""/115, 0x73}], 0x7, &(0x7f0000000940)=""/127, 0x7f}, 0x10000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/capi/capi20ncci\x00', 0x309000, 0x0) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000a40)=0x5) 17:07:22 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x800, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002780)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002c80)={0x0}, &(0x7f0000002cc0)=0xc) fstat(r0, &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000040c0)=0x0) r11 = getpid() fstat(r1, &(0x7f0000004ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c40)={0x0, r0, 0x0, 0x16, &(0x7f0000004c00)='!cgroupvboxnet0%(eth1\x00'}, 0x30) fstat(r0, &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000004d00)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004d40)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004e80)={0x0, 0x0, 0x0}, &(0x7f0000004ec0)=0xc) sendmsg$netlink(r0, &(0x7f0000004fc0)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x900}, 0xc, &(0x7f0000004a40)=[{&(0x7f0000000380)={0x23d0, 0x2b, 0xa, 0x70bd29, 0x25dfdbfd, "", [@nested={0x20, 0x7d, [@typed={0x8, 0x2c, @uid=r2}, @typed={0x14, 0xd, @ipv6=@dev={0xfe, 0x80, [], 0x14}}]}, @typed={0x8, 0x54, @u32=0x80000001}, @nested={0x109c, 0x87, [@typed={0x4, 0x64, @binary}, @typed={0x8, 0x67, @pid=r3}, @generic="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", @generic="1a61cd8ce23aecd6c9d22dcd71b4775f6f6205da0303bfd2c868da9800f50f9db39a973c66208e8c251510259ae7492b7902944e6982e016a9606d73a2cfa92c876ba7e874bec3125895bbc834d8f2cea7c1dac6ee39b3d6accc3663cea2bd0a7afc0fdb129b56e9c92fcbade4a7d9b5", @typed={0x14, 0x34, @ipv6=@empty}, @typed={0x8, 0x3, @pid=r4}]}, @nested={0x204, 0x2f, [@generic="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", @generic='K', @typed={0x8, 0x1e, @uid=r5}, @typed={0x4, 0x63}, @typed={0xe0, 0x2e, @binary="cf94c7987cf6a72ce02757fa18db9d02a9301ea306c7b6c0a6a3b61119586f1fc6200d055898ff7a03382a488a1c9ad8e12b181da2c3bed7e2dc6e8cce9a70fdda1fc9efe9d7f58ae34d22058fa2839d814b43b6947d0bdb7c8d52496e77e215b4b567c7b6db5893db7da34fabdb54b857be81f647aa87f9d4c1de1e774a1826f283ca92a49ed2d1a37af94ba08973f826f3b90b0ce759eb63ae9a8a698050bfa1da869d65b6529165fbeb2203e10f1227cbd70fabe399d5cea85b7aa60a8a33422caf92541ff270b6577394e6f1977f65f020a8bb1393bcb9"}, @generic="851634b0f096052aaf7750", @typed={0x8, 0x34, @uid=r6}]}, @generic="6bdc56888a0a8bf631bd11458c3240bd18827ea320a67786e54632e8b33aa4dc6cb8bb04e5bad1c08d8d0020af393ee774a9c77b68f8051b98b195593153fdd0", @generic="2fef7c006adc8841cc365364f037781c47f23c778178d37684648c9b31724b16dda441e6156808c1ef93a346cc4ff6a3d5c61645fde9abe6f9cefceef4541735dcd16c82fdfe224d7c8ee9a06c9d96fe18d88b48aeccf79d21e4986ec277fef6a26ae18d031288eadee222e84b03b89fc85da9498afbfb834a5d422e78599644b12741dfd2bcab0ac6f5f6408865d9ffb10e41bd3fa339435c9dd4ca631b0026caf3f64b81c576e62ac68ecf627d2261c4298dafcf", @generic="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"]}, 0x23d0}, {&(0x7f00000028c0)={0x1cc, 0x3b, 0x400, 0x70bd25, 0x25dfdbff, "", [@nested={0x1bc, 0x48, [@typed={0x8, 0x7f, @str=',\x00'}, @typed={0x4, 0x34}, @typed={0x8, 0x91, @uid=r7}, @generic="9f6ca721f3d657ccf9fc4abac9115331da265dd3af71d960960980157455cf6262b83e4dfca5553effa0e413676f9b9a07efba57de27ce08f87631e997b6101bbfbcdd930174eecc068dac782e4d75a9f98f8272dd63e5ac1f5c77536612743a89bf1005b37b699e2555772560a56e6fa789e151ceb0e9810b0001dce8b1e93771a8e1b8865704289e84f628769e35d4f4e434352257aaec5e0c4c3d6855d61d379b8cd3226808", @generic="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"]}]}, 0x1cc}, {&(0x7f0000002ac0)={0x1c0, 0x3b, 0xa04, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x1a0, 0x7f, [@typed={0xc, 0x6a, @u64=0xf34}, @generic="9fd07438a783b557e18469291772d6fcbc8d22858ede74ca35ccfee828015ae017e5357b72a8a8369b71178f6ca58cfeebe78763fa39e9e7fca377f87d8659c995af58", @typed={0x88, 0x6, @binary="59183a0939ff87750d4d0c41e85a369acb5321ee47e4944721847437fd72e1995f6a14e11aa99035c5f5a50880a8d003992ce7c1088817e6567f6c726029acfc3b09f7129deee6c2ff4df85fc0f6814a197594748173f6b588b481cca087d0af108dccce0a5cc75405af27a51e380eee76f95c1af1c0871dab367431be2edf0ae58698"}, @generic="4768ab03722b0227ecc471ae003eb05972f6304dbf3ccd56465496e8c788f8ad417b7cd12062149c0ed9cf9513d21466c14cda4da2e402f4c4bd3fe1c028d406968f526f13632dc2d17eee900d98486045ed9658bbc456504266a0423b41423b0ee51fda399113839652b7bed744bebc0232cce052421052bd3e1bdb986a7a7bcd96cbaef9bbfbc961be7e81deb26d5baefb79c57cf404acd7ba3ff751964ad9c47538018142187670ba64590036d668e69a2e3dabff836f4b17eadae378556b7f2e"]}, @typed={0x8, 0xc, @ipv4=@broadcast}, @typed={0x8, 0x6a, @ipv4=@dev={0xac, 0x14, 0x14, 0x1d}}]}, 0x1c0}, {&(0x7f0000002d00)={0x1308, 0x1e, 0x920, 0x70bd26, 0x25dfdbfd, "", [@typed={0x1004, 0x3b, @binary="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"}, @nested={0x23c, 0x2f, [@typed={0x8, 0x4e, @pid=r8}, @typed={0xf4, 0x41, @binary="2de6cfb3ef5fbb2bc8481198866ab3e24f76e499ea282fcf0132440ec33d41c20ffb64a4be8c0a35fed9d3b5807eccd0531e96d6eddb772379539e5d4c4c7bc442879eaff57cfb9a6d12831d9f7756d8fd1857a09e87a4dff25e2475e8639e158f494ec0dc2d9c9ecac1d6ca44c8fb9f455dee0d33f5aea1ee0e0d179243ff6fb737495f41c2b5fb9da44340e4a7b0131a0540d4566221f3da4010c5e35902af2598300e38b89c379f13680291adc6ea43f41d2ccda0e61a184757d59872a808d2ed7c862dac19f366dfdf54e5996e4a89d9191fe8d6f1dee649f2a46cb19129bfd8338e1132143fb061d269dbd49cbc"}, @typed={0x8, 0x88, @u32=0x100000000}, @typed={0xe4, 0x75, @binary="024b8c4d35a149e4b18bedc22d48282708a7f149e9cf1e5728bbee7741221286c1a5250567e5f12475a9623ad6171751fe88e098ef0af05bf6158ee25ca81d355b50227af0d7c8bf2e4b91853e77345e2f6bc542c7645494d1c4c0630a7375bfd8e496f8fe33545d10b7916cf255b4a5302b61b3c460264b190e54406a56e7dcdc9b4ce37baee309f0c7789f354486fe30ec07478cfa9c8cee0c465080deb4b47d36c000706b2ef05eabd2d6daac097aff9a5cdb05f63c94f6eeb9347f41b2a90b8c967b0aa53d453d8653115df2a3552c25c35a0196adc5c0264bc7e8"}, @generic="cb35ac8d949c27aaa3e94837a643", @generic="501fc27eff16214a35c7a6e17970c81fe3e2d6922399ffa5153e11f6c528ed0e02bc6619b81cdf506c5da0ee43a9c363713e7291a5afaa4194ab", @typed={0x8, 0x13, @str='GPL\x00'}]}, @nested={0xb8, 0x5e, [@generic="bd5698afea45eb6fd0f22b5d76831788e9e1c7f6a5fdfe81e4faa3fda641044bad7b46a30bb55daa8b394376f21cf25a363ff56359755b4ff9fd8bb27f04e0", @typed={0x14, 0x90, @str='/dev/dmmidi#\x00'}, @generic="307af8982ff67225908e776d1b30def311b309a7bee2d299a446ade5d725bea713a1aba9630e81bd3aac6bae03764bd43bd564a1a3019682f2e5fced2a2de2a1b719a429be0914f57d86e594d312ee40fa7065a701b2aac7ca01fba2290aae0e4f"]}]}, 0x1308}, {&(0x7f0000004100)={0x534, 0x1a, 0x2, 0x70bd26, 0x25dfdbff, "", [@typed={0x14, 0x57, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="a5b8", @typed={0x14, 0x44, @ipv6=@loopback}, @nested={0x90, 0x95, [@typed={0x8, 0x43, @u32}, @typed={0x84, 0x1f, @binary="e8f62f8b69f4d02da803d04d2a32c5788193c02bca0d21aba5988bee1bcbd26f5ef92d9fcc9ec0041c18225a4027636b0dbbaf3167104e893b609ccfeb22ed278ff89241ea3817d6b152f5e970f8b6a1702214b5e5508f0e5fd6f6d10b1377a45e65a9b7594ce5968baa99a9dcb86c9275cb195e04b81c7bff9d892901"}]}, @nested={0x1c8, 0x73, [@generic="fd1fd7", @typed={0x8, 0x64, @uid=r9}, @generic="11517c81ddbf2b4410dc6afb1586aaf816aad22df9be7a58777d58a7abd9e048cf9ce1d6f9709f16a6f3c320878169f23f32f95e6064e5b490475838ad4dc3cc04317401abeeeec5b8e3aa474bcd7158ccacc90084ddf7cef7ab09373e52005285a8e66667140faa49068efb29da58922607265192e1de2f6569e905461216e4df34ae6f73d1841de30a1c93ca761303092def1d9a14d625786bb75392fbbe148e11d37b20a8bceb919f5a2684d1d76d7a68633315968e59c9dbdfca37ee5c9e6fa3f9af884d354f6422a34c52b6825abc0f35f1", @generic="b37e05cfe9d21cc507d01b125b8f6a9c7fe07ebaba3244b65f7488414abe723a39369b2c164ac7a4933464424bb74d23d237a976d47437e3df82f629a13f84d3cdf0b940797dd3c05663c5ae4978cdfa50bd1921593e2dcbc645bcc60eb99b28b8bacfb1cd357cfff0d7d4060c4da15e551a38490ae27517c4c7a65a7eafba3ecac048ca4092981045504c9b0d7b43f99a21a81b4e21986868b41befaef9f1248763c450c92895c7792e92c4350a21aecc8506697108ebcb807025ab8e9103ddda338e2e3f6139f98826c793c6db18ebc0b0b093e809af", @typed={0x8, 0x20, @u32=0x6}, @typed={0x4, 0x3d, @binary}]}, @nested={0x298, 0x8a, [@generic="9b6d07d034f3cdda523d6f1fc1157c875bdbd4b1a0dfefd6d845f74d3d2981b7028323aa19a6fc1cb06adca759d4aef1b6737a6294248c2e1f0c25cdeb38c6a8e94992dbc6adf9c908b5894c189548893a4f7686d5107d679a96f8e60f488c", @generic="6666f4cd97d9e61aeba5edbe12ecad00d81878d82bb5daa753e03a39f516f2ad601e6cce600c0cdae7497b4a28164427383edbfe4ea72b44e0c73d9026f0237a95cbf59b70187950c72702e1380496f2e91f9908cb7a26e4d74a918707ac28f1249aefd53e13dd3f16becbb7cfb2e427567d7fc896bdddd5790cd392c634f0c717a4d3e6e26cb9e7d23b09023f6800e170347a9058f2756558103294e0d5c3586438e172a4fa131b4b24a6954f240d0ae0d85551d6d8f7e608e633c41fa9777975e888c5585b8d2cd8", @generic="b8928a7ea4cc6605379b76d6eead7fc64e1655ea8911f0eded670de94414298aa769a199d2e01015111b6c55073fcf725158be2beb395e898e8236846815ac1619a8821d59d10274ad1593a04c305b4c32", @typed={0x8, 0xe, @pid=r10}, @typed={0x24, 0x5d, @str='system?vmnet1%posix_acl_access\x00'}, @generic="9e6df362c545598939d38ef5f3c826f4cba4ab844751c39b2bf3195449825fdcb2353fc5f944f0775de8218cd6907f760c63d610bb4a88df881e68111d19e313d0fd425a9d6e088b8707096aa472b75a57afdb625901f31c423f8deed7abc2739af86285e7aef7ab63842437ef270675cf9c9ce4b62f856506364842e0bceae63d3e548ed3487608ef763588accb6b349baaea8adb52eda1cbabb0ef674d6355e8acedcc508217046c1f79f48419e942d7a96906d3def06459dc75c8544bfaad3392dd8c194e5f67c82ed1a63f2dcd1c2ba6c77377ff905d807048a5040a3ee90fa85a536fdfe02dd307bedd"]}, @typed={0x8, 0x59, @ipv4=@multicast2}]}, 0x534}, {&(0x7f0000004640)={0x20c, 0x1f, 0x200, 0x70bd2d, 0x25dfdbff, "", [@nested={0x1fc, 0xf, [@generic="f5a3bd235c73069d427ed4538d3f9952891353ab945a51fd5144329dd6fea7c49d45a1b20f0af2b32469e6a6a24409068d66c837f60e8682db4e2f0b4cdc764d4c41ce746a247b1a00198a1e76de58eb65be93515a26c1d5ea7a43f0efbfd9ea9d261a1cac4ced623b80431bd4a6f1daad54e22875b6b530efc1b23f8aeb346c160cde641b3344630624bbe283482326ad4ce5cf3ff47d2a1fb844208ad43ef74db781bf57aab6e74b62c3a88c73f57126a97a655271aaed93a021ddf8f7c0589acf722e78af9b06346e1dc76c532093d398b94b", @typed={0x4, 0x66}, @generic="6d577563c64cfdd906cea2325befcbc55c11460e07f637e715bd87d20fd7d65bdd73b3e0f055d5c8e6a1e2ccb4ef10d56b3ae98f34985821fb99f291efc195ea99", @generic="9f6260f8a31ee6aa0403b35aff12da58e51d6e3a9630a87380c98e7d4f98c056694423d472d142f2f7c516c62dbfa70e1a6dd4a1d5ba0b20a5848c964b9d1fbe0c0619806f35e64e7437d566352c7681a3916034b7b9c1d7efaf80967d423c38f82c56b142458c1bf26e37660f4f87a29313938e46bcbd1f0fd1cc7d37a0e1af44f03448904a0e93ea9c37eedc10bd1e93a4a364775932af7b374eaec8799963c928cda9632c5c02845a4d80665166b2e45e8515cfa80940c16509cd5861b30e910ca002503d8bc15a7b9f0931d2b151d88fa148d3b3013510e7091a25c3"]}]}, 0x20c}, {&(0x7f0000004880)={0x1c0, 0x40, 0x614, 0x70bd2b, 0x25dfdbff, "", [@nested={0x184, 0x6c, [@generic="1a1dd0f3a724e00d0617d6dcaa8d9c1740d1426a89b1bbe4b719833f4ce6ae4768f9eb9d8f3ce5cfe5f7298947c6e6b01b2289cdcb0225e26efb133a28441e745018e6e748ee63f1aadd182733d32cef2647e058e950df684934a43ebe4628a027a68f1d001d8b67047833289091cdea67d95ce22a50a02cb28971e731227cb3612cf23f0c8a5bf334dff3217be734ad064984dc3f4b3d61ae79495552078792a3ac0563f8695b1609b3", @generic="4268e1e97680c5c9578b6ec7e2ce39f656552591a4fe4a82816c52b2977440478b434219d34abf191d1315811b153e45daabb076397ac412577b96bca62c250ecbb99fc8fcfe70f26e6140f002ad009ba349447149bc36a5b0260c3679e657b044b2a9d55c8a28680bea2c0ae01da57fdde98ce3062e53b197b9b11c9f2e41c61ff5851dc3d65e506f2d3ba4aeddca6c137bd5c0f18dc4b65a36be3a8ff7ac2cb933e0093bb24bbb268dc651a281360eddd72fa38146f3334236fcd784cad4e731c7f12ea5f527dd5687cf8ad9eb046b", @typed={0x4, 0x5a, @binary}]}, @generic="f251c7003ff7778f5fcb97620cb54e2807c95b6c836d7eb052c1efcfc2e33003172af736133a2a47a0306188"]}, 0x1c0}], 0x7, &(0x7f0000004f00)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x20, 0x1, 0x1, [r1, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x38, 0x1, 0x1, [r1, r1, r1, r1, r1, r0, r1, r1, r0, r1]}], 0xb8, 0x1}, 0x8001) 17:07:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x88, 0x5, 0xffffffffffff521d, 0x10001, 0x8000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @ldst={0x1, 0x1, 0x0, 0x3, 0x7, 0x2, 0xffffffffffffffff}, @generic={0x580ae32c, 0xd78, 0x4e26b6d5, 0x6, 0x1}, @alu={0x7, 0x0, 0xe, 0x1, 0xa, 0xf0}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x72, 0xb5, &(0x7f00000002c0)=""/181, 0x0, 0x1, [], 0x0, 0xb}, 0x48) 17:07:22 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0xffffffffffffffff}, 0xfffffffffffffe97) ioctl(r0, 0x8913, &(0x7f0000000000)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x101, 0x12140) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x3, 0x100000000}) 17:07:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x400, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4400) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r3, r0}) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x101000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000080), &(0x7f0000000100)) 17:07:22 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) clone(0x1110800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000000)={0x0, 0x91}) 17:07:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00h\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000002b0001955100"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) pipe2(&(0x7f0000000100), 0x4000) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40a000, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[0x0, 0x6]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) 17:07:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x4000) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1df8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = syz_open_dev$admmidi(&(0x7f0000000980)='/dev/admmidi#\x00', 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000340)={{0x8, 0x140}, 0x1, 0x6, 0x7ff, {0x2, 0xfffffffffffffffb}, 0x5950, 0x1}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="050000000000000002004e20ac1e000100000000000000000000000000000000000000c802000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e247f00000100000000000000000000000000000000000000000000000000000000000000000000000000e5ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1e000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac141421000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x490) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r0, 0x8000000000e, 0xfffffffffffffffe}, 0x10) prctl$PR_GET_KEEPCAPS(0x7) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f00000009c0)={0x200000000000000, 0x4, 0x7f, 0x8, 0x16}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xa5, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2cf87800", @ANYRES16=r5, @ANYBLOB="01062dbd7000fcdbdf250e000000080004000000000008000500040000000800050002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) 17:07:22 executing program 4: clone(0x4e108f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000040)={'batadv0\x00', 0x1, 0x6}) 17:07:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00l\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:22 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) shmget$private(0x0, 0x2000, 0xa00, &(0x7f0000ffc000/0x2000)=nil) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) socket$inet_smc(0x2b, 0x1, 0x0) 17:07:22 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000100)=')cgroup*\'mime_type\\\x00', 0xffffffffffffffff}, 0x30) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x214, 0x38, 0xb00, 0x70bd2c, 0x25dfdbff, {0x11}, [@nested={0x1c, 0x19, [@typed={0xc, 0x100000000, @u64=0x8}, @generic="210cc6d0633bff2d125b60"]}, @nested={0x144, 0x2c, [@typed={0x60, 0x2f, @binary="d6bffd9fdce2cf64cfaf187fac091b84b3c7d5cc07114847c84cdf78368a71a7442548504740606a29b88287728b1ae579d379da5df493da904d46fde8000c4a247b796903ac8a956a1f9e228fe6dfb9b5e5a6be1e2bd1e21fc26e9c"}, @generic="2bf448282153ae451ccbb0c082dd7a21deda3394445c8100dc4699a3a5a40288b29765ec358abcfd5f96a374b924e5ee414b770ac78a3d0f0608a922506d36bd7b1072c752e9ecd7f609d09a13d3e9b730845bac116bc4e05946dae13f954eacb3b5b1c809304f17d8559fd24d3394579efcd83f1b6f39445089ef2c4f68f9d8bef6c8d52e7b097dd61179d7f3d4cdead58c9894b11e7d7758d34e9c6753f698759e6a4df084e7c81b3baaaedf5b46d13914b6e8d522a4ceef77bbce20a14f812dbdc1947f6a2c14e4a71c0b09048eb35ad5e8048f8633044e68f3cb5b20"]}, @generic="1930de5f04f053e101557646b2948a61805d8e861436daa29d5309d14048a680a0e9d5a14662655a70bd9379d567c11fc2fa0f1f3aac4639bea1239e0ab70f0eb50174b89c42ed001ae0cd58b6fc630f155c2486e081084536f9acb28afe", @typed={0x8, 0x7f, @pid=r1}, @typed={0x38, 0x7e, @binary="a78ed633e57596f74a61ba7d8a6fe6f8e460cb49bfa87b20884ff3482433c00317f81f5e598e380bd9a47909142349ba11649e2c"}]}, 0x214}, 0x1, 0x0, 0x0, 0x8041}, 0x48000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$cgroup_ro(r0, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:07:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000880)={0x0, {{0xa, 0x4e21, 0x9, @ipv4={[], [], @remote}, 0x5}}, 0x1, 0x2, [{{0xa, 0x4e24, 0x2, @local}}, {{0xa, 0x4e22, 0xffff, @ipv4={[], [], @multicast2}, 0x7fff}}]}, 0x190) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x200, 0x425, 0x5, 0xa6, 0x2, 0x7, 0xfff, 0x47, 0x38, 0xf5, 0x3ff, 0x1, 0x20, 0x1, 0x0, 0x3}, [{0x6, 0x0, 0x9, 0x8001, 0x4, 0x4, 0x5, 0x2}], "20ab2b9042c6eb10ed318772e8ca3e94648191c9e7108d4631f0159cd3e93862cf1446eb6f1052f79b36cfc1d902", [[], [], []]}, 0x386) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mountstats\x00') ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) [ 401.269720] IPVS: ftp: loaded support on port[0] = 21 17:07:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00t\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:22 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x138, r1, 0x102, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x277}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40}, 0x0) 17:07:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000009480bc963c3cb4750830d41a6c5394ee93dd890a0c441279bb456acbd05478f20bb2a0836d1e53966616bb9bd38d241376c72e1442798db7e11d927755bd22231203df06daa46887b489ed2c4d812210ca71fc3f20e1c1375"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = dup(r0) accept4$vsock_stream(r1, &(0x7f0000000000), 0x10, 0x80800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00z\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:23 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt(r0, 0x5c, 0xffffffffffffffe0, &(0x7f00000005c0)=""/32, &(0x7f0000000600)=0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000800000400009500b40000000000afbf20a64c3f8eb44660aef5192cca0e600507cef0fb93974a7f9353211ff1f5f060207dfc6a69e39aa952b6d2b5da5bcc594875b6ddb38ea92ea74f35ca03460e0645"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x20, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000640)={0x8, 0x7fffffff, 0x5c8}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0x6, &(0x7f0000000540)=ANY=[@ANYBLOB="1d751800ffffffff40fb010008000600d4540000fcffffff1800ff00ffffffff00000000040000009500000000000000baa5fe1d550f9fe43c58b4576abd060c19"], &(0x7f00000001c0)='GPL\x00', 0x7ff, 0xcd, &(0x7f00000002c0)=""/205, 0x40f00, 0x1, [], 0x0, 0x8}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000680)) 17:07:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./p%$\xed\xf1\xd9roup\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0xbc, &(0x7f0000000000)="f0b6239061393609681779bdda79", &(0x7f0000000180)=""/188, 0x80}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, r0, 0x80000000005, 0x1}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x1000, 0x800) ioctl$RTC_WIE_ON(r2, 0x700f) [ 401.589483] IPVS: ftp: loaded support on port[0] = 21 17:07:23 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffff329, 0x400) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000180)={0x333670ec, "6dffb38b521f1d87adc273785eb35f9cea9dad1295a531e943598dc4f738d5ea", 0x2, 0xff, 0x4, 0xff, 0x4}) 17:07:23 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000000080)={@rand_addr, 0x0}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e, r1}) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r2 = socket(0x5, 0x100000001, 0x3) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r2, 0x8916, &(0x7f0000000000)) 17:07:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0xa, 0x2}, 0x10) 17:07:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x800) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x81, 0x80) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f0000000180)={0x5, 0x2, @raw_data=[0x1f, 0xa5a, 0x2, 0x3, 0xffffffffffff2933, 0xfffffffffffffe00, 0x8001, 0xffffffffffffff14, 0x401, 0x800, 0x101, 0xb74, 0x96d7, 0x3, 0x5, 0x3ff]}) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000100)={{0xbf, @local, 0x4e22, 0x3, 'wrr\x00', 0x5, 0x0, 0x44}, {@local, 0x4e21, 0x10000, 0x7ff, 0x7, 0x9}}, 0x44) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xc0\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x4a8, 0x0, 0x140, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @mac=@broadcast, @broadcast, @broadcast, 0x3}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @rand_addr=0x8, @empty, 0x8, 0x1}}}, {{@arp={@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff, 0xff000000, @mac=@local, {[0x0, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x401, 0x37, 0x20, 0x3ff, 0x7, 0x4, 'veth1_to_hsr\x00', 'bond0\x00', {}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x1ff, 0x1) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000580)={0x0, 0x0, {0x6, 0x8, 0x2, 0x9}}) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000680)=0x81, 0x4) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000600)={0x200, 0x5, 0x4, 0x10000, {0x77359400}, {0x3, 0x2, 0xffff, 0x8, 0x1, 0x8000, "ef2aef8a"}, 0x200, 0x0, @planes=&(0x7f00000005c0)={0xfffffffffffffff8, 0x0, @mem_offset=0x7fff, 0x5}, 0x4}) 17:07:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00 \x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000800000000000000000000000008950000e98f98b122"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)="385920f0a9d69338ca4e9f8b52ae82d3b062896e060cc99796c3bd553c5f43ef00f957fffd54454fba410df6cfe78b38028079064153350ec948416c1b6bd98f39b054f6517aaa4c7ad9d16c8c1c8f95c8a27650fb9a3ee1cbddddfa6a90e86fe458aacbeebc0edc3a21ee8dfbcb1508a52fef0d13fd777298fa0c62095515a772f114ef239475d94b69f0d7a2593ceb66139868935190efc0c295026a33de892f8d400f838a9b9ac5e61abe3fbb70516991966213", 0xb5, 0xfffffffffffffff8) keyctl$get_security(0x11, r1, &(0x7f00000002c0)=""/160, 0xa0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x40, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000004000009500000000000000f07f03f074a11d76e1de91bd84903562f184215dc21990c94ab5d5d08eb01676bdd8064d3eef8785fe4c71b72226ae19e46d812ac9d79b49fb9975e6db6adf40f4ca9930a098e0b1d87fdd82e3424a15ff90d03b508cbab45588164cd742f907a579a5b111439c684ea768bb0115ddcc83f0f181022bfb"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x10d}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x2000000000000088, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0xfffffffffffffffd, 0x45, &(0x7f0000000100)=""/251, 0x4, 0x0, [], 0x0, 0xd}, 0xffffffffffffffef) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:dpkg_lock_t:s0\x00', 0x21, 0x3) 17:07:23 executing program 5: r0 = socket(0x17, 0x100000004, 0x43) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) rt_sigqueueinfo(r1, 0xc, &(0x7f00000000c0)={0x0, 0x1ff, 0x15d}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x80000001, 0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000140)={0x1fd0, {{0x2, 0x4e23, @rand_addr=0x7ff}}}, 0x88) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:23 executing program 4: clone(0x400a4800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1f, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x2000000000}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\'\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x20f) 17:07:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) clock_settime(0x3, &(0x7f0000000100)={0x0, 0x989680}) 17:07:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000180)={0x1, 0x1, 0xffffffffffffff01, 0x67, 0x2, 0x2, 0x8001, 0x2, 0xb07d, 0x3, 0x1, 0xa6c4}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x44200, 0x0) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000080)={0x7, 0x1, 0x6, 0x5, 0x5, 0x1a, 0x13, "71adfa7f990663a2a597242e7e78d28f341ea693", "aea07b488a415278d20eedbf0fc93d06ae437e33"}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:23 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={r0, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000140)=0x10) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) 17:07:23 executing program 4: clone(0x200001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000058ed25a1354f3300000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x301000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xfff, 0x20}, &(0x7f0000000080)=0xfffffffffffffe57) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r3, 0x10000}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00/\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500110000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x454000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0x81, 0x2, 0x0, r2}) 17:07:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000049009500000000000000a963aab5a3cc67f513dbd46440680f0446245b810fb3c51d6c4e895cf3614e4a0ead71fc7f934482b5a2141c6b4e87815f9242418559584d2221"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000180)={0x8}, 0x1) fchmod(r1, 0x102) 17:07:24 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x3, &(0x7f0000000040)="11913543891f7ec21de9a66bda8a9c30b13d9b81952c52008663b2135bac39db985286e33f0b461bf357414bca7f86107f6211448e214d142e85fa11e780d9b5402827f6f7278eb143b7e5ede9c83f3b5915e5307990de19cfa1711ec880898d85bde82ae5f920bcc74e3ea8c9655138809c73f832a922499970a5da7e567591b82fda00487a02ad6f96ada6c54ec8d66c17235b9c9ad831658d15a0fe8cdd91124036677a1e8da6a3") 17:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x10000, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000001c0)={0x0, 0x6}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2102, 0x11) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) connect$nfc_llcp(r2, &(0x7f00000002c0)={0x27, 0x1, 0x2, 0x5, 0xfffffffffffffffb, 0xd7, "cab71e3ff50fd848161cd0bf8dc6c020c5876f1c9c36354dff97255cd239f4f59f8dcf02de5357b08453bf8fdd7e27a4b7aa09319e2423195215f9d66b6e1c", 0x2c}, 0x60) 17:07:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00mA\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:24 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket(0x0, 0x100000001, 0x40) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:24 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x10, 0x9, "1466b682eed903c9"}, &(0x7f00000000c0), 0x400) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x440, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000004c0)={{0x10000, 0x2, 0x10, 0x4, 0xffff, 0xfff, 0x2, 0xfffffffffffff1f2, 0x7, 0x2, 0x2, 0x2}, {0x1f000, 0x4, 0xb, 0x3ff, 0x1, 0x2ef, 0x800, 0x4, 0x1, 0x1, 0x3, 0x3ff}, {0x5004, 0x4004, 0xc, 0x1, 0x13f, 0x4, 0x6, 0x1, 0x9, 0x8, 0x6f, 0x6}, {0x11d000, 0x10000, 0xd, 0x99f, 0x8, 0xff, 0x1, 0x7fffffff, 0x80d, 0x6, 0x100, 0x9}, {0x1003, 0x15000, 0xf, 0x4, 0x73, 0x1, 0x100000000, 0x1, 0x8, 0x7fffffff, 0x4, 0x5}, {0x10000, 0x7001, 0xa, 0x6, 0x3f, 0x7, 0xa25a, 0xffffffff, 0x5, 0x6, 0xffff, 0xd1a}, {0xf000, 0x2, 0xb, 0x5, 0x1, 0xfff, 0x7, 0x7, 0xfffffffffffffffc, 0x4, 0x8000, 0x1}, {0x1, 0x1000, 0xf, 0x2, 0x3f, 0x5, 0x8, 0x4, 0x8000, 0x9, 0x6a}, {0x3000, 0xf000}, {0x13000, 0xf000}, 0x40000000, 0x0, 0x5000, 0x10000, 0x3, 0x2400, 0x3000, [0x4, 0x4, 0x100, 0x80000001]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000020000000000950000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000080)='^\x00'}, 0x30) capget(&(0x7f0000000180)={0x39980732, r1}, &(0x7f00000001c0)={0x0, 0x0, 0xfffffffffffff000, 0x4, 0x80, 0x80000000}) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x101, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xd}, 0x5a) 17:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000004c0)={0xffffffffffffff9c}) sendmsg$rds(r1, &(0x7f0000001800)={&(0x7f0000000500)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000001780)=[{&(0x7f0000000540)=""/106, 0x6a}, {&(0x7f00000005c0)=""/76, 0x4c}, {&(0x7f0000000640)=""/234, 0xea}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/24, 0x18}], 0x5, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:24 executing program 4: clone(0x10003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000080)=0x60) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r1, r0, 0xf}, 0x10) 17:07:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00H\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:24 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:24 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) accept$netrom(r0, &(0x7f0000000200)={{0x3, @rose}, [@bcast, @null, @rose, @null, @null, @remote, @netrom, @netrom]}, &(0x7f00000000c0)=0x360) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x12001, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:24 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x2) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e22, @multicast1}}) 17:07:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00L\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) getsockopt$inet_tcp_buf(r2, 0x6, 0x2b, &(0x7f00000002c0)=""/212, &(0x7f0000000100)=0xd4) 17:07:24 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = shmget$private(0x0, 0x2000, 0x78001016, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/238) 17:07:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000180)=0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000008000)='.\x1e\xe2\xcfc\x87%YE\x18\xcd\b\xe0p/', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007f40)='/dev/btrfs-control\x00', 0x400101, 0x0) write$apparmor_exec(r2, &(0x7f0000007f80)={'exec ', './cgroup/syz1\x00'}, 0x13) recvmmsg(0xffffffffffffffff, &(0x7f0000007d00)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f00000002c0)=""/228, 0xe4}, {&(0x7f00000004c0)=""/212, 0xd4}, {&(0x7f0000000180)=""/113, 0x71}, {&(0x7f00000005c0)=""/111, 0x6f}, {&(0x7f0000000640)=""/132, 0x84}, {&(0x7f0000000700)=""/74, 0x4a}, {&(0x7f0000000780)=""/148, 0x94}], 0x8, &(0x7f00000008c0)=""/77, 0x4d}, 0x4}, {{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000002c40)=[{&(0x7f00000009c0)=""/180, 0xb4}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000a80)=""/9, 0x9}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/16, 0x10}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/32, 0x20}, {&(0x7f0000002b40)=""/207, 0xcf}], 0x8, &(0x7f0000002cc0)=""/129, 0x81}, 0x7fff}, {{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000002d80)=""/106, 0x6a}, {&(0x7f0000002e00)=""/247, 0xf7}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000003f00)=""/228, 0xe4}, {&(0x7f0000004000)=""/38, 0x26}, {&(0x7f0000004040)=""/179, 0xb3}, {&(0x7f0000004100)=""/43, 0x2b}, {&(0x7f0000004140)=""/138, 0x8a}], 0x8, &(0x7f0000004280)=""/245, 0xf5}, 0x200}, {{&(0x7f0000004380)=@isdn, 0x80, &(0x7f0000004600)=[{&(0x7f0000004400)=""/77, 0x4d}, {&(0x7f0000004480)=""/68, 0x44}, {&(0x7f0000004500)=""/199, 0xc7}], 0x3}, 0x3}, {{&(0x7f0000004640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000079c0)=[{&(0x7f00000046c0)=""/145, 0x91}, {&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/44, 0x2c}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/248, 0xf8}, {&(0x7f00000068c0)=""/243, 0xf3}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x7, &(0x7f0000007a40)=""/89, 0x59}, 0xb1}, {{&(0x7f0000007ac0)=@tipc=@id, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000007b40)=""/195, 0xc3}, {&(0x7f0000007c40)=""/118, 0x76}], 0x2}, 0x7}], 0x6, 0x10000, &(0x7f0000007e80)={0x0, 0x989680}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000007ec0)=[@in6={0xa, 0x4e23, 0x1ff, @local, 0x2cf9e65a}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @loopback}], 0x4c) 17:07:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = socket(0x3, 0x6dad9908cac52469, 0x200) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x20, @loopback, 0x7f}}, [0x1, 0x80000000, 0x7ff, 0x6, 0x3ff, 0x9, 0x5, 0x0, 0x0, 0x7, 0x0, 0x6, 0x100000000, 0x3, 0x401]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0xa9}, 0x8) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7885, 0x480000) write$cgroup_int(r3, &(0x7f0000000080)=0x1, 0x12) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 17:07:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00h\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:24 executing program 4: clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x30000, 0x0) r1 = dup3(r0, 0xffffffffffffff9c, 0x8000000007fffd) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0xfffffffffffffe3a) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:24 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) r3 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x9363, 0x40100) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x7ff, 0x1, 0x97, 0x3, 0x0, 0x400, 0x0, 0x4, 0x100000001, 0x7f, 0x3ff, 0x1000000000000800, 0x9c, 0xfe00000000, 0x100000000, 0x6, 0x9f4, 0xfffffffffffffffd, 0x800, 0x7f, 0x9, 0xffffffffffff2583, 0xffff, 0x8, 0x8, 0x13e, 0x10000, 0xf0be7b4, 0x3, 0x20, 0x6, 0xa90, 0xc43, 0xca47, 0x7fff, 0x7, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x7}, 0x20, 0x0, 0x4, 0x8, 0x9ef, 0x6ad8, 0x9}, r2, 0xe, r3, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffb, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000300)={0x0, 0x1f, 0x401, [], &(0x7f00000002c0)=0x79}) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000080)) 17:07:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00l\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000f7000000000000000000040000000000000000438be660f99339f7f31f4b63d69d358d1d2000000016c81e47ca7ec0a205638b1469915f5052de46e054e4b1d8236958aa4eb6b80ebb69ca6a445ae252292294829735dce30213113c0b0773da49de42df19729dd1ecb24d0f97405da77dc0a55122be5302b16dc2516eff287a09e7560468acd72d5f58721da15216a0f7d940e302d250b7f26165e0ac60aebed42b3a37bcf8b94757200463238327d6bc86a2ee443e77c9192137b9502f2d7cfea052c5fa0238a434233584b10c00"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000a40)=0xd0, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x11}, 0xffffff0e) 17:07:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1e0918e68fbf0f671b29f608a8fc1bb6ce5e0000000000000000000000040000009500b40000000400"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:25 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1887fca3d197000000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:25 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80000000, 0x181000) fcntl$getflags(r0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x100000, 0x111000}) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:25 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) bind(r0, &(0x7f0000000000)=@can, 0x80) 17:07:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x288000, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00Am\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000550001000000004095000000000000009500000000000000"], 0x0, 0x1, 0xc3, &(0x7f00000001c0)=""/195, 0x0, 0x1, [], 0x0, 0x200000000000}, 0x48) 17:07:25 executing program 4: clone(0xffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000ea0300000000000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:25 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) tee(r0, r0, 0x3, 0x2) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = fcntl$getown(r0, 0x9) r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0xffffffffffffcfac, 0x3, 0x0, 0x556, 0x0, 0x1f, 0x80, 0xa, 0x3, 0xcd8, 0x100000001, 0x5, 0x4, 0xffffffff80000001, 0x9, 0x8, 0x5, 0x0, 0x1f, 0x0, 0x3f, 0x5, 0x7, 0x3, 0x200, 0x6, 0x1, 0x1, 0x6, 0x7f, 0x100000000009, 0xfffffffffffffffb, 0x400, 0x8002, 0x306, 0xfc49, 0x0, 0x2, 0x7419611d14d670f6, @perf_config_ext={0x6, 0xffff}, 0x404, 0xffffffff, 0xabc, 0x9, 0x7, 0x7, 0xfffffffffffff410}, r1, 0x5, r2, 0x9) 17:07:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000b55eeae31145db4b95564212149500e0ff00"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x10000000000000}, 0x10) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000140)=0x2) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000080)={0x1b, 0x7, 0x1, {{0xe, './cgrou\x17/syz9\x00'}, 0x100000000000004}}, 0x1b) 17:07:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000061e63e66b750000000eeff009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:25 executing program 1: syz_open_procfs(0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000600)=""/246) socketpair$unix(0x1, 0x4000001000000001, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:07:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00t\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:25 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x2, 0x103000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000001c0)={r2}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/104) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000180)={0x20000000000001, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x2}, 0x18) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl(r1, 0x8914, &(0x7f0000000000)) 17:07:25 executing program 4: clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x101, 0x4000) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)) 17:07:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000f1000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x400009, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x3, [], 0x0, 0xd}, 0x48) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ubi_ctrl\x00', 0x20040, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0x4000000000d}, 0x31e) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00z\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:26 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000009500b400000000000000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:26 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8020000", @ANYRES16=r1, @ANYBLOB="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"], 0x2b8}, 0x1, 0x0, 0x0, 0x4000}, 0x4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0x3, 0x4) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 17:07:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000001f000000c393665fc69d7775000000000000000000009500000000000000388b2e13f4e5a2b4ca99e7cdf1f40c2bef34239ee6eae8cce36a8099add01c0161e518709d5965de895c2e7c3e2832187011d627dcf9f10aa5365ef985b4f0ba906d4b9cee6e2dcaa63d66a09864e9acec55e28f9e77b3c22c266bd92159035c9a4bd0f989b4d80bb93211e24c5b2e7f5ff216f99ce09e4b02fe4249df88b8f2e4a7ff5098b7c7895141e1bc6a348e32f58e3c4a82b561711b48a6c9ff26eee80bcbfddf90bfaced9e6151f9b1425e78c6d10aac741a79b2573168937510e27bc2459efeb9e46879"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x8000, 0x401, 0xffff}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000004c0)={r3, 0x100, 0x1000, "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"}, 0x1008) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:26 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x2000, 0x1}) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000c88a7b6300920c0095000000000000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\xc0\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:26 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 17:07:26 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r1, 0x8000, 0x4, "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"}) r2 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x03\x00', 0x1}, 0x3ff) ioctl(r2, 0x8916, &(0x7f0000000000)) 17:07:26 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000780)="c9", 0x1) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 17:07:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xb) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:26 executing program 4: munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e28, @empty}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}, 0x40, 0x0, 0x0, 0x0, 0xffff, &(0x7f0000000040)='team_slave_0\x00', 0x6, 0x9, 0x3f}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x701800, 0x0) 17:07:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'rose0\x00', 0x600}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) 17:07:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1f, 0x400240) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f00000002c0)={{0x4, @name="e7204fe16c5778a4baf1d69f6cc56e1945253c35308cfd5af5de4ae09e400b05"}, "53c50dfc5f7482d7bc5c5f7b2c18048ce40848b792926c9655c881ae5c2b8f36"}) openat$cgroup_type(r1, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:26 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xa854, 0x280001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) 17:07:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xa0\x01\x80\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:27 executing program 3: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x0, 0x0, {0x9, 0x1, 0x2011, 0xf, 0x0, 0x1, 0x2}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) 17:07:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000e7ffffffffffffff0095000006b144a900"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000180)=[@timestamp, @timestamp, @window={0x3, 0xffffffff, 0x254}], 0x3) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f00000004c0)={0x9, 0x1, 0xe, 'queue0\x00', 0x100000000}) 17:07:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x01\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:27 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8, &(0x7f0000000000)) 17:07:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) getpgid(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) tkill(0x0, 0x0) 17:07:27 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x5, 0x3d, 0x280000000000000, 0x81, 0x7, 0x10000}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) sendmsg$can_bcm(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x1d, r2}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x7, 0x10, 0x6bc, {0x0, 0x2710}, {0x77359400}, {0x3, 0x5, 0xfffffffffffff123, 0x1}, 0x1, @canfd={{0x1, 0x9, 0x0, 0x38f}, 0x25, 0x1, 0x0, 0x0, "72ae28758c4384cc5121e4af4c83aa67453f93ea3a6842f4f926912e830da317e72f12412c7e6e77208bf7d2456a04ef0d44d7d60bd6f31855f897ce304d456d"}}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@dev={0xac, 0x14, 0x14, 0x14}, 0x4e21, 0x0, 0x4e21, 0x7, 0x2, 0x80, 0xa0, 0x0, r3}, {0x4, 0x10001, 0x7, 0x2, 0x800000, 0x5, 0x3, 0x100000001}, {0xfffffffffffffffa, 0x9, 0x79, 0x7}, 0x95, 0x6e6bbe, 0x1, 0x1, 0x2, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d3, 0xff}, 0xa, @in=@rand_addr=0xf800000000000000, 0x200, 0x7, 0x3, 0x9, 0x2, 0x7ff, 0x2}}, 0xe8) [ 405.641375] QAT: Invalid ioctl 17:07:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = dup3(r0, r0, 0x80000) connect$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x7f, 0xffffffffffffff44, 0x898, 0x2, 0x5, 0x2}, 0x3}, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) 17:07:27 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x1000) shmdt(r0) 17:07:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x9, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="18fa01000000000000000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x7, [0x20, 0xff, 0x99, 0x8, 0xffffffffffffff29, 0x8c6, 0x8001]}, 0x12) socket$bt_bnep(0x1f, 0x3, 0x4) pipe(&(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x7fffffff}, &(0x7f00000002c0)=0x8) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6, &(0x7f0000000800)=[{&(0x7f00000004c0)="5af30f7985d8f025513f844fe0c44c5555e404504437188b8b6dfb02d30e9e4a9550c139f21c504d29d915c84844cb010abffc96f6dfbd31ca06e41293fe44b4bb3e241553423219f4870096cc9b49701ce6a3eee54f8a55fcca62a8ff149e32ecd9a9eb80de5d64d4a98cbc2009249549888e7b1deba5b6fa3e761803002daef1bfec8656efd00b6e4392dfd67756efd15b08", 0x93, 0x11bff5b0}, {&(0x7f0000000280)="554cb41b2697847e2df08bd814ceacb7196daf1634ab3dbb7dfff53e50e3defe07cf3e9b84bc392644375c333db08c027b6b", 0x32, 0x6}, {&(0x7f0000000580)="623d3a05799f2a3b1d5e07226f6e21631cc5195934aec098394e25719cd0b6bff8150ece3c38c49e603859d1c6296df7a922263961468e91c725ec5fa6ce4d599e827dcfbacebd785504976ad474e0947cb307f7", 0x54, 0x6}, {&(0x7f0000000600)="ef6c11408de02d65e87c7f7b042f2069a8495f3a7a5db099c31c6db35a9d3b45e6e0746a0839f1bbc6d5f54a14cd1a636cf81df9c5b7fde08fda2fb5bcf70126a768a179cf94e12afa0af02921f21d24286ecda9c3b0a65ee487e7e59586afa1d2c4ac57cd3fccc11af3a9a06b178a1c67ac2362934c3c373aba8b31bcd629bae8128862ec3ae36ccd56875ba402e0afd7296cd6613d02fc00bb52f1ed2e6498cd8dafb5b6bf52ed53ece5dff7624651bae505e0885ead95444d575945716909f673939959253051c40d0b12b3854ebd0298a660e08dbda265fe5d7f60b767c9fdd8234c83025ca7", 0xe8}, {&(0x7f0000000700)="0fd0fc54c14aac83ac3b8c9d7277c5869d661e72218c68b0ab8087b132451b21c3d807ebfd50ef611b4ae70de454e9", 0x2f, 0xd7}, {&(0x7f0000000740)="86fa49647e47b4904bbe6cb865905a79760aa79941a069b21fb4b02f36855124f8e362e9ce005248c2609a84f1c7f96ef7f2434ebc2b2bb21abb1f4e8ada8db68a7177862c9a50c5d3b72607df71c1c7cd57e78ef21188fe2e0a4dfcadb88f179ee039ce2a64a8afd2a569f0e6c7c1e37029ed5facf0ee8b6e2bf515128c5c7c791403bb809fdfed511f247c80c02403e5cd", 0x92, 0xfffffffffffff000}], 0x80, &(0x7f00000008c0)=ANY=[@ANYBLOB='codepagd=775,check=relaxed,fsc\x00\x00\x00\x00\x00\x00\x00\x00oot,smackfstransmute=/dev/sequencer2\x00,roo|context=unconfined_u,appraise,context_u,dont_hash,appraise,\x00\x00\x00\x00\x00\x00\x00']) 17:07:27 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) ioctl(r0, 0x2, &(0x7f00000001c0)="2a4f2cc2379ecbcf2ead02cae917b362cd16020ba34741a4d8145073b91b651754651ff16ead7e17979c6da1e3383a3d9de5ee7ebfde6bf5c6c0a4c1989e05f2e9a97d1452aee960ed54b47424b8487da229d01896ddfa49a910a4410e25d1800f0381c6f147fcd842d2c2139effc1a7c456e778faa52fcac21fb730884a887c0000000000000000000000000000677b76286a251dbcc50bf0200277429e55ca890483913cbd4d0bd8fa066514b6d10869ca259820af5c3d0c6a8058ac") 17:07:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 17:07:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x02\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:27 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x3f, &(0x7f0000000000)) [ 405.887346] FAT-fs (loop0): Unrecognized mount option "codepagd=775" or missing value 17:07:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000100)=""/219, 0xdb}}, {{&(0x7f00000002c0)=@can, 0x80, &(0x7f0000000080)=[{&(0x7f00000014c0)=""/171, 0xab}, {&(0x7f0000000340)=""/72, 0x48}, {&(0x7f0000001580)=""/128, 0x80}], 0x3}, 0xb6}, {{&(0x7f0000001600)=@sco, 0x80, &(0x7f0000001940)=[{&(0x7f0000001680)=""/197, 0xc5}, {&(0x7f0000001780)=""/94, 0x5e}, {&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/44, 0x2c}, {&(0x7f0000001880)=""/178, 0xb2}], 0x5, &(0x7f00000019c0)=""/23, 0x17}}, {{&(0x7f0000001a00)=@l2, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/122, 0x7a}], 0x1, &(0x7f0000001b40)=""/117, 0x75}, 0x7fff}, {{&(0x7f0000001bc0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)=""/62, 0x3e}, {&(0x7f0000001c80)=""/180, 0xb4}, {&(0x7f0000001d40)=""/195, 0xc3}, {&(0x7f0000001e40)=""/67, 0x43}, {&(0x7f0000001ec0)=""/192, 0xc0}], 0x5}, 0x5}, {{&(0x7f0000002000)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002080)=""/97, 0x61}, {&(0x7f0000002100)=""/63, 0x3f}, {&(0x7f0000002140)=""/180, 0xb4}, {&(0x7f0000002200)=""/41, 0x29}, {&(0x7f0000002240)=""/116, 0x74}, {&(0x7f00000022c0)=""/44, 0x2c}, {&(0x7f0000002300)=""/30, 0x1e}, {&(0x7f0000002340)=""/252, 0xfc}], 0x8, &(0x7f00000024c0)=""/106, 0x6a}, 0x10000}, {{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f0000002540)=""/239, 0xef}, {&(0x7f0000002640)=""/152, 0x98}, {&(0x7f0000002700)=""/247, 0xf7}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/95, 0x5f}, {&(0x7f0000003880)=""/86, 0x56}, {&(0x7f0000003900)=""/199, 0xc7}, {&(0x7f0000003a00)=""/64, 0x40}, {&(0x7f0000003a40)=""/158, 0x9e}], 0x9, &(0x7f0000003bc0)=""/159, 0x9f}, 0x3}, {{&(0x7f0000003c80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003d00)=""/111, 0x6f}, {&(0x7f0000003d80)}, {&(0x7f0000003dc0)=""/63, 0x3f}, {&(0x7f0000003e00)=""/185, 0xb9}], 0x4, &(0x7f0000003f00)=""/151, 0x97}, 0x7fffffff}], 0x8, 0x40000000, &(0x7f00000041c0)={0x77359400}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000004300)={&(0x7f0000004200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000042c0)={&(0x7f0000004280)={0x1c, r1, 0x800, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x44044) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) 17:07:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x04\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:27 executing program 4: clone(0x802122001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x0, &(0x7f0000000000)={0xcac5, 0x40}) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000300)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x4}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x70042, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) r3 = getgid() write$FUSE_ENTRY(r1, &(0x7f00000001c0)={0x90, 0x0, 0x5, {0x4, 0x2, 0x3, 0x7, 0xcd12, 0x76, {0x5, 0x2, 0x8, 0x0, 0x8, 0x3, 0x9, 0x30b, 0x9b, 0x1, 0x9, r2, r3, 0x4, 0x200}}}, 0x90) [ 405.988188] FAT-fs (loop0): Unrecognized mount option "codepagd=775" or missing value 17:07:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xa5ec2f9) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/84, 0x30008}], 0x1, 0x0, 0x2a5, 0x4000}}], 0x40000000000002f, 0x0, 0x0) 17:07:27 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 17:07:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="0000009500000000258d00000000000000000000000000022165ce573a46e2c07ba8ebde7b1a17819e0e12b4ddf89ed8c233bb6000fce951064e81c015cc7c49c08de61dd876cad0535ae525fb965f6db91507042369a33b83ceb376a22adcdffa6d51cb9aa7cc"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x40801, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f00000004c0)={{0x0, 0x3, 0x81, 0x2, 0x8000}, 0x6, 0x40000000000, 0x3}) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8000, 0x101000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r4, 0xfffffffffffffffb}, 0x4) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000002c0)=r3) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, r3, 0x8000000000d}, 0x281) 17:07:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000cf1ee5f9917e5ed8e1879a30a9423fb60835373b61ccf81d013aed33745aa078897ef1ff33ecedfdda3db5ee0dc01af4c4f859e7bbcbaa2b055feb7383e7c46cd8c756a7e3cdb7ba70b8ec53eacf82815d7b9a77b99fffb6dfed44f32a3519dbb89205e9047c3dbb7b2547eb12543fee8405398236372d1bdca553fb911493a5bb146056d1cc130c776d2bd5a4899977e1dc69a627b7427ce4b74ebd91a585fb"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./c7$\xbf\x9d5\x00\x00\x00d\xb9.', 0x200002, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="348631fc6288f47db50cdcf9f0f119a6", 0x10}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000002c0)="35fc5c5a445bc1b892029e1571ab84a9a491d508959cd6caeb4cf6da38f4b1b9e58a6f8496bef47eee16cf5b47362423ada2cfb9f30e27d91f101362bce751e9aeaf0364f57c24c54243ab779efc5ab0a1643f63d2c5fb8a12bc46a66463921fd3845b84744f3ca3799198b8f5d0e0f404afdc7748a87a2bb5e6bd408b4f950a45696fcbe2d0d2c4dc134f1e55992f4fae9d1f0471b28dba52b4fbde0b7365c4d6b0c0bc54e8255ca1ffd35d5bdea73badefa35efc38127b0af82b08ed6567cad8f5264a543c6469e3736e541aa63957448b8b0c297919", 0xd7}, {&(0x7f00000014c0)="5b2c8f24cad2de126391181fa3d7491745cfb3723bc670155816f3976c89bd4f45d5e968ea67c0784e9977c1313eae5de4d98a994dc65a0faa582d87972b38842807ab041d892aaf04cdbda3d94cc6444ce8c6ff1436d0c92cb368045fcc8552fa0435c4120c1d945c8fe8a854697f95f390b8cff2bae5219f5c8d04ffa3e7e5fb9919e1aa2a86b1a77d979c5e14ea752575a23ea6d1b3ed908e25c8a0ff148fa435bd69d1d9aa3a1b36e8b8a884cc2e3297fdfc72df73837546ab1d08279eacbc3e09d885525a18c8b08ece4b010cdceb2e16c87cff51429380e39c3651da8defac6d9314629e89d990df", 0xeb}], 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) [ 406.257473] Unknown ioctl -1068477435 17:07:27 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x101800, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x10, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x21}]}, 0x38}}, 0x40) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:07:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00 \x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 406.292824] Unknown ioctl -1068477435 17:07:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000a26586eaffecfd8eb3ff010000557f83fce4b5d6e4ada951c36232900c947850a39f9495aa6f08272370677e7c13cc593d2f2180d8f4010eac1d55365d3ed69c04b4f2bc442a0ce0580678db1691466add5cd8c716dfcfd39ac81f352a9a0ea2f64100f24b8f430f7412dcb9e059688f23fec8"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000100)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cg\xe6 \x8ew\xe7k\xc2\xcf\xe3JkI#Z:croup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x2adffa41, 0x91c7}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000003c0)={r3, 0x8}, 0x8) 17:07:28 executing program 5: r0 = socket(0x200000000000000e, 0x3cdb749982d96ee6, 0x2) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x7fffffff, &(0x7f00000001c0)="4ceee3137c126eda367f88e118ed049825c8e994c1b8cdcbfb96ed1ba807c32ebc67e668eca57238875d2575cb0080308998c3ae426087b9ac379f839166cd84d165919a03fdb5b17242ba2a3b910bb2885f7684ec588a22c33c40fa909862155bdfa651745eab4e5b2cb4bf38e002fe9620482685826d0710aa346fb5bb6fe204c237124172e71e67d157a458c20afaa7af83f4cf6b279622386f82") r1 = gettid() ptrace$setopts(0x4206, r1, 0x5, 0x100002) 17:07:28 executing program 1: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 17:07:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000d}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x8, 0x200000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000300)={r3, 0x2}) move_pages(r1, 0x7, &(0x7f0000000100)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f0000000200)=[0xb640, 0x6, 0x2, 0xffffffffffffffff, 0x401, 0x1, 0x5, 0x0, 0x5, 0x3], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) 17:07:28 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x10b) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, r0) 17:07:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\'\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) getsockopt$inet_tcp_buf(r2, 0x6, 0x2b, &(0x7f00000002c0)=""/212, &(0x7f0000000100)=0xd4) 17:07:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\'syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000002c0)) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xa4, 0x4, 0x4, "3d3ce48d0fd85e161338d49e43d3e3c8", "387a9b3d143aedd06f1f543f87a8034f4d2732532cb1e8d9e1deead0b9f1fa73919363c17133d6d9bb81fdb878d067e427b7e002c79c8b5dfec8b4631484964c79e30718772d8cedf9b4ed1dfc40e6e4b702331e83ffe81a1111033b67e2eb3f36c09fdfb1d689a8ddc6977614470cd33f16beb5612b46cd8c7ad27b8e1ac45bdc90c5b413ba0c8988d6df4f1f5f07"}, 0xa4, 0x1) 17:07:28 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0xfffffffffffffdf2) r1 = socket(0xa, 0x100000001, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) 17:07:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) socketpair(0x1, 0x6, 0x3cfd, &(0x7f0000000100)) 17:07:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) getsockopt$inet_tcp_buf(r2, 0x6, 0x2b, &(0x7f00000002c0)=""/212, &(0x7f0000000100)=0xd4) 17:07:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f1ff0ef18620ac5a67a4f2ba3a4dbfcc060f6d7c31cf50e0b4c2f571647b2d263dfb5f86ccfc81064fbbbe1f5076088c"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xe}, 0x10) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x5b7}, &(0x7f0000000380)=0x8) 17:07:28 executing program 4: 17:07:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00/\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:28 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000040)) 17:07:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e22, @rand_addr=0x80000001}, 0x10) 17:07:28 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) truncate(&(0x7f0000000040)='./file0\x00', 0x100) ioctl(r0, 0x8906, &(0x7f0000000000)) r1 = getuid() getresuid(&(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)=0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x10001, 0x5, &(0x7f0000001300)=[{&(0x7f0000000100)="9efe77d2d7dfc4a65a762fb180279cd1d2c9ec9f1e06f85e57feadbb91ed55b9cb65830c7f1440", 0x27, 0x2}, {&(0x7f0000000140)="5c00d61e33e271761dd8ee19ed27eda2135972f9e487856db42d8765d5783b717a08b3a6e13eb30cd44f", 0x2a, 0x2}, {&(0x7f0000000180)="2a0700f13d0e5931b38627a2f27b6d883c56cca216146036f0c973804a56b41cd2f2ab67d3b19a484349fe2515b8497ff820f8c6309fc6843e132f94317cc89db8de25dd5c0c245105c5f67b5c170f825f10a49eda4d0b7dad77fa17ccfc2d49d8317912909e3b76dc54f78c2039d817c15ba4acf745b2c2752b3a6185d0a31b", 0x80, 0x8}, {&(0x7f0000000200)="9d2c4bc9c981668e3d03855f421c3b0d6dcce75543e1c6453913d45b67edffcd7a9a7dd3cfcc899d2d054c14c9775207695c6a09b890383ad3d471565b526ca2d75deff202aa70425f9874f5a01418319c9f653ec3f7f9d3ee9941d0afcc4487d1fd7e3f8d4cd23cfd3f0d3131c48a8404d475adea58e54281253c233c9dae95119786b781b4cbc5d551d171c7001fed920a761796bfd45dc52c9519d69dbdc3e32ac0349b166c8e249e74dcdb0bfeda9e1cdc04eb8bb7c6f6bfc5a9daca9c24452a604879c4a43d4f45fd17116d7fc0363be343c356905c8eefb411570fc7cebc36a0d221c7e0c6e588c4", 0xeb, 0x7}, {&(0x7f0000000300)="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", 0x1000, 0x7}], 0x30041, &(0x7f0000001440)={[], [{@euid_gt={'euid>', r1}}, {@euid_lt={'euid<', r2}}, {@subj_type={'subj_type', 0x3d, '{'}}, {@subj_type={'subj_type', 0x3d, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '#user'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) 17:07:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) getsockopt$inet_tcp_buf(r2, 0x6, 0x2b, &(0x7f00000002c0)=""/212, &(0x7f0000000100)=0xd4) 17:07:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdd}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xce7b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x40080) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0xd000, 0x2000}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r0, 0xd}, 0x10) 17:07:28 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x22, "8cf810c4bdec2ea2cf98c54841d99bd370f8f325b5fa999839fa8545f3b35a062ae7"}, &(0x7f0000000100)=0x2a) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0xfffffffffffffff7, 0x20}, &(0x7f0000000180)=0xc) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f00000001c0)={0x0, 0x7, 0x80000000, 0x200, 0x7, 0x20, 0x27, "6dc5e226ff64a00b2540a47961c1c2ff2c8fdb09", "59d96fd5ba8b5ad092e0ebb222c5d7036d8f266b"}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000200)={0x3f, 0x4, 0x3, 0x0, 0x0, 0x7f0a, 0x80, 0xb8e, 0x1, 0x2, 0x6, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x2, 0x7fffffff, 0x1, 0xfff}) getpeername$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x10) 17:07:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00H\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x50) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x400440, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000180)={0x3, [0x4, 0x1, 0x1000]}, &(0x7f00000001c0)=0xa) 17:07:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) 17:07:28 executing program 5: socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) 17:07:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000100000000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:28 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xa, 0x84) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x80) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x9, 0x10000000, 0x0, 0xf, 0x14, 0x14, "d07c3427e1bd1fc4fa09603862af0b46bf572366f8ea8530b11e04ef32bcd3f710b17b851967333be7ad9199d1d5c1734cbb7b1671d39cbe21a01b0b22d2af63", "fb97aceff183631ff0e6573bb4fe4c86d7980519b6d208cac0b15f503b2d7885d5a93d838c9f9cc44f7882f9d88a1ad73711d420611984531870e3cde7f0b1e4", "e4fe872ee020de5ae27b36775bc683c6bf0c0d0ab59689d20d29f4aa56f35c11", [0xed5e, 0x8]}) r1 = msgget(0x1, 0x30) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000400)=""/46) 17:07:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x9}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00L\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r2}) 17:07:28 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2000, 0x120) signalfd4(r0, &(0x7f0000000180)={0x5}, 0x8, 0x5cdebf012182a906) r1 = socket(0xa, 0x100000102, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000080)=0x4) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r2, 0x0, 0xe, &(0x7f00000000c0)='nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00'}, 0x30) fcntl$setown(r2, 0x8, r3) 17:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=ANY=[], 0x0, 0x10001, 0xffffffffffffff74, &(0x7f00000003c0)=""/251, 0x0, 0x5, [], 0x0, 0x7}, 0x3ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0x6, @remote, 0x200}}}, &(0x7f00000002c0)=0x84) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000340)=0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40001, 0x0) 17:07:29 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x400001) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000000040)={@rand_addr, 0x0}, &(0x7f0000000080)=0x14) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={r1, 0x10001, 0x4, 0x0, 0x2, 0x1}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:system_dbusd_var_lib_t:s0\x00', 0x2c) 17:07:29 executing program 5: prctl$PR_SET_ENDIAN(0x14, 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x80100) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20020000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x10, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x2, 0x6, 0xc9, 0x200}}}, ["", "", "", "", ""]}, 0x30}}, 0x8050) ioctl$VT_DISALLOCATE(r0, 0x5608) accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket(0xa, 0x100000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x20}) ioctl(r2, 0x8913, &(0x7f0000000040)="d1aa890c9ab30556") 17:07:29 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x10100, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000001bc0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000200), &(0x7f00000002c0)=0x4) rt_sigpending(&(0x7f00000001c0), 0x8) statfs(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) fcntl$setpipe(r0, 0x407, 0xffffffffffffffc3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r5, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00h\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800c1, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) 17:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) 17:07:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x200, 0x2, 0x8, 0x8, 0x80, 0x800, 0x11, 0x8}}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x8) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) 17:07:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00l\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000008009500b40000000000f34fb9cf067ceecd506ccc81e91f0867320a5b9f22415e077f1a212383524e3251923392372dc0df4679afa731fcf93c0511293a2cdd473d4dddd62875b7ac915e908c18cbeca0eb5277228936dfb3ae53b9a9c3922a3b8ebaaf2366a179b937e5a61fa52b"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r2, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) 17:07:29 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xd87, 0x101000) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000000c0)={0x0, 0x1, [{r2, 0x0, 0x2000, 0xfffffffffffff000}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0xffffffffffffffff, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) 17:07:29 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000010c0)={0x4, "4716fd0587e2d2ed2947d10a056f2e4618e6e28ef94585bc0d2796da4ac87d8b", 0x1, 0x1}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x40) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000080)={0x3, 0x18, [0x5, 0x2, 0x40, 0x8, 0xd6, 0x6]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="37a84828527e068f96dc8a9339f6d1d57d134eaee16298e0022020fba28ebebcae4c25b053453a7598bbc8ac61f095034fe7421937c0559524dc9eaab186f292f187f28dd6332bb63878905fc48cbf31ba225b033fb599f579981bf67d06e86847d4c5eeaab50c97b1107bbe101fba619c6f76374d0768e05dc4e50b5561943ef85d087cec4a302f4d249f01de10a029739e22b1199487be73cd653a5eb220f0bb3e143c3f2c2cbc2c2a2cb2a1efdc29ea5dcec9a54f0fdf072466c7922f5cc3dd62e1639c200c602855e4c9d489cacb4a43a5e3d1af745da23d17481e1831b638d079c5c6cd1bd087ddd150c2c19e64618bf00941280a523934977b7a25cc72ca7849c81b83bfdf3341d37281586a594191ec1ee540b6664ab91174f96485f4af78e63623f6482c7a5d6fd7cf4e8c05bbf2f2befe3e05614b6ef0e1b22e885f23781f24f7a544df1a06c5da60426d1d6de22b21bd3fdd898967792fdd5a3b5340b91670bc66119e6ae1437ff89e0cf85391a225ad8f2ddb64c078a347fc19e27f7074e69c1c1d684acafd46c82a6ac21d25a2f40e1c5d561d0229128f1f7faba36afdb4a463bff00383d5141c57bf89fcb83a2df07d1546674699ad37fa86cd211c81c3745a7d1082b6ec5e308f6faabb510ae8c52a92b278c38f90a65cf271bd2d36bdf7aa10c0b012c39d400791a867978c61c8e1bad1bcf4b6b7d2d655b6aaf9397a0eff502db8a2fcf5befc6db92792edf122325ed154201e2308a0a287e0e71b7ed80c52a2cf18a872eef10d52b06e459f214f52ff6a5560338f4140250859fe8117f97fcb835a09275278385e0c8c628685dff0da5794002eabb80aa5c6b60a7ea0c4ce746613fbb325af30b8668f67f7d3554714be8adde50eb65aba447941f56be804c6972c6cd993ddff68c9c289aba7f1b24144e975afccbabd5c490fb3792739d396cfae62ee9f4f513acdff6e3d693e5838881f79521b05bf065ec2a6e4e3fc14c756e304aaccf15b223c9754cfcadc3bdad568c241bfc5cd6807c4cef732f659dfd718c46ea047866610e0df4f527e68848e164d215060f84ce67bd3cc8ef49de7fbe9a658a7af003f1478c3dfc91dde58521f6a8e251bc04a1c08f589122e93862639e9f3acd36cedcb86cbec2e4c6af4e0e660c68b1fa846222a340c6c3d20d9dd3ba523f52ea6a2b0f96240aa224cb8001ad5844d1eea02d655557d0945be241b2b07818716114c36b2d4f0be562b182d7787f417aba3e0314cc58bed1c82c1712e62ac349bbc16ad3737403470495034880e1e081c3d23e0e9e68151ecd0cc480ac3d5f13ad82b3f753170b805c35cfe49dd3f49daa291f3e3702ba47bdcc31acb9e72f127fd139800e7547310d87987cf864ca7e6d3db92b17ef0ebe74585a5d2af8a6c2a87eb8eaab8dc13904c77e1012a538e20f22ad00e9483b3116e6b08632a697810eaf50421a9c449a33b052d9596dd522d7c215c953b3739462e610f3e7d9a1d95c57b9b26f0bbb4a4e10b49b6c990509f442a1a0143c2963f0d1a07a384a1ce1dc80fddaf8cfced270fddce93f378f94be5509cea73713ffa50055bfc109481bad81295c44778b0671613443a4f0f22299ef1345230acfc11f9fa31d6ea76e625fd534e77ece7db401bec16d161f2ee75c0c470acb84f3ab33bcdab3eb06096407a49b043706c6042c6286148396f8efbdf9ee14af3d1348779296ff9fd02ef7a9309205bdb4480eb8f9b4ef8b1ad284ce2428cdaf5523c77d670a5f3a81929a74e9d9d1c5d26e19e298a6e1a827b452987d1fb4123e015e6271c2544f0caa3df5abf2a3f4bfec20b4af78a82b6466e381748b7ab058cc15e6a91e8313f63cfad4fb9b8b0640614752104cad2803d5febfdcd3f6a1d23b10e83b8230d246ad8d705550afa509641fec39b3054c5d402c76aae8bb17b1af18b0e0ac675eb9b27f98bf9c85fc93d8e1e53a224c58a36b04105f51a8a4e59a643ee3c4c2e2efbe28e176978ff3e5ef96605d9e0919d76968e6b1f7e83835825fc1af928bcf45720941771bed3ec6271876b3ce781c3fe7f8142519e05c17ab11e67e25468cac0859f481651b53ab22860a0a7a1f7ee14ad925ac456e6e7c96002ad00c9b0a4e548e4639079c41a2ac386c80bf9b412b03666ca2f86839eae12b26b719432f073b61d54c6462cb2dce5d8432566038439a445714ea39a6af0799ecf65c229f4a76e6c4baf499f00799d9ad7f1606f7ee749a288e26a37a150ed59fac7d7795ded68e7d68b77f84631b3fe8565ba4e61b28aca01d6639f7d03a7b06accff5bbe3ee4edbc6fd03476c4bd2c913b9f5d533dc8a31ae78f04970383bc7f63e1a15fa8cb75bda11b0b4602fd874f37f316bf7f9b27b8316abbc2d49d07810d7c64336c935e9e49ce0a80718034dae88c1b34eea206e5b45b32442b5dc18cc638f71544b85794d716e67d71e2c732ab1ca377edea23917d68816236c3215ad17d8c6dd43aaae6a93c42cec3097cefc3d22ba2935b08a9d33c311355ddff54734aa914a9f0b1af7a72f6effef1d8daccbacda17f6f95bc36103afee7635f02b21f630573b4374f92a97edeeadb083a1d5d74d61df450aed8893ef23df1740a7de40988a78e973f25ffc75d82ee16e369e259f5a216efb9d1cd9bd85c18da1babaaaa180491e58a2c16ae9d400ff2a7f44eb6a12c77fc36741ad6c1372328be796ddfc022eb185dd398f30aac78a5c14a3562dfbf94c943fd0b392ef8108140734517809756a17cc32cbb5104d361a3b26242383633fd0d29fb492471fd8e3ea15e78b75be72d00ad14256fd249b064b18cc32dc686be4cae62643f24b5d0047eda4b9e5a7b018d097da6e05c9dc9fa3a631b020462a6ca642dc09bf4bf23751780c682c328737968a6289385dc493b3bf40da7932a33024e803470a11d58ba2e34858d271eb7ac0dec4bec26470406a4aa0d78b3060efca57990473eed890904ce025a1f0157e0279ca469b6c4b97f0331f7b9be0d58c7c6a99d766f345988789cd3ccabc06bb600fe7f78be345b0081ae2ee4bd4a03332ec6809e17dedf576a1e435d1099c3ab7f141b4f5ed2fa191fe8ebc609c573fbc70b3a44f806736c98c3924f47a76b55baf5516be2f696e7fac1a6c90b625878df62aabff9b43d2ea20d20811d23f06cdd5d710ee19e8ecadefeb2b67fff02158fb2ab29f38fc9134553ec6bf93b435f68b9a9673dac0507f79599ca3a813433f8c53f7b7e631fd6779e9687956201f0986ead321b289a0c0133b4b425ca0d27d59aeb54f047691073330a5160ebbe0b1934fea652694f04d7d1ab72774baf35148f4e82af48a1d5843017e2b25eedb838e7475451bbdc4ddb2f7195b527ab2a1d59b0f946b5182cc9ad45a0aa70bdd33abc999c67480f2543453d523c417ca2c73afc66db1d370e1fe5b4a198f49995ddaca56b7a2019fcb4def5605160479b35be065940d2dc77fe28719355a10599fb8f68bc330feadd4ef1b9346636603c2255cead84bd124191a4daab5bf0ed848e8e00eacfeb5b327c58af4df819596487b31fa8310a5c0838bebed5a1985cd6ae83bc58a298501349a832ab00c27e416aa2e8a177bfed784d0e153121dbfef75fb316434ee006d138bad7ccba936f2aebe2931e2faa673b6b7aea109c53cabb3bfb09bd9da1ab1b9c3661d0d81e386d6d7d74225c236dcede237006ed78d8b9b2bb70aa1f7943db389f321c45592852e5f8833c137430f4cda2b235bd28a113d145ed36d690f05420d755d9cade720c536e2d3ab9c0033e5ac8d36570f4ed898e122623ade023dbb82d5d67a8a7f13e0e6ef4e45804291dcbb6381461a9416f38d927bd1dfa52e0a8f5e230a1ae68cb429905d8f18c97627922be64f5d2ed603ba1cd8ce2e0bd93f0bf8997f55e241b4b0e2d17c9ae42c650bfb6bfe6bbc5d879a3037d7b2c237bf12484c89a159324e1e8c7b45e1605e9d7dbf779536b183936bc0eca970da6e73af4d821947a53de5a097210f78b0ea9de593bf4f0aa004d885cf175bdbd7446391d306a0f9f69596de725fd4d66b5f16e88a25b0c1c7ea02716e5b2cf612b656378eeab8822acd07ef136ee0e3e4fbb79cf26c87e4649c1c1922a9e64ae8132288157d8ffcb5077adbc99de7d40a064872a29b5c489e98c41511480a309c4da10053a4ab120290219dc94d66c4eb5a70bd00f10c5955f292656c2459f3551054d3c4cee3b0dd35ec9e9d26d7236261c8eee958ca05e81a287db356d2001b2dba8b774faa67174b59b3808a9aa19efdd79a461218c8ff302c8f079a838e2abf7a4451f08202e57fa9680fc445058a322a463b7da699faf8eb349a5fac348f354da91105eb0b4a83a8f056a9287aa4f388c159f331181ffe16d5af342fb53be8b028ea6330e490f8801a705227f19c6ac04f8f2d1026c7517dc293fc7969e7afe9aa034a21e8b5de8430fb75c71bcda787478a90f86861a0b84953585cf15108875509ce05cee7034a354b15a48cce9ecac1391f32bca868b73b77a377f295b3d9be8fb01d4fcf7560ab67470a311d7a3fe810c28c389dadbbd8987b44faf2aee463eec546aeee74522a992d6bacf2a1ea700710a17dd20a4a4b61fa9fd638a47f3e3c7606b136bd410b516ef2e233f0ca37b1ce5ee93fb02c8c15bb58acdf5a80bd60b09c87dce0270bdd5d2ac610076addd5a81b1629d90d3be3d1a3ea3384c1886945888d26bf128b92197875bab6c7699f605309e14e3db5d924c72453e3ff815ac9591369d4af09a72bcf03e190f4ab94e8cefd422882c0425804fa395b7d189c08de796905600a3de9ddd9b8752da921a880e36c494a551da4f6a18a4146c4d993d8ada657415f7a52d11debeeee1b1458d8b5d3cf89194c96e18bd12230adc7da1939423f47398b4c89e341bcac63e43071d529d1f6def6843d1ce773a1bec2c944b705a58cdf47895f39f6aa3be6d076b9bb3afa8d84d48f7843c01529ffed871d56755ce613e949de99ec711721d988cea54a0ac262535b9f8f2fe5012dec6ce05189514df5c98c8043f7501781ae7d19e28a7f45833027408fd664eb3facc958e85c16779a62baf5065c0c73aae1334b70975f3cd5d2742983a375324ea939c77a553af1be3073c666122b7e3593739258538653b6943aa9f9b35be556ac26fbb46ceb909284975d8f2c6391a88632a2d962544a0a59ea2e6d1f062e3eaf0ca3cb67054990fe362f9ba50312a0c80abbf89bbd2cf0839a181cf69c17d87e554d79be53da096b74888de69171bfcae800d08ac001eb2604b661932b56afbe061927b3ae12f254cd9ffac47ebb3c5fbb31b657bdfed027947ab0327e0f45b4e635a0be852fc8aa790c36e28ad6531f2043b5cf3c885db7613c745db63fa6d1e6c89e2abaa629a95d9cbcf95fcd11e068a57dff3539e6711e8772e2ebc40656f51bf856dca9eeb09bd44321c0e4e2404e373af2a661d99502913daadb4aa010f7e4823de86a8e44c5565d847dace41cf823072a81b71779991095c092d8eef62ffb6f388a922113cf00c9f11e39cafec74d159d6a27746438719113edec0aee1ebfc98884dfec23c25fe913d66fbd9f0216851994cb12b5c56a738fa4847d7a212e25cd4ab6d42c529df9bdeb47acc14d428f9241242c51606eb1e963ba0dc8a95169d5faca4fc4f3de6ee6b0d478583ef98570fe0320975b7f1a3c1b3384d02858d80da90d6932f8a2569f208913ae8d9c1960479e7c5f8c04dd6913389e3d285985f506660", 0x1000) ioctl(r0, 0x8916, &(0x7f0000000000)) 17:07:29 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x101000) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000040)={0x0, 0x2}) 17:07:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x6) 17:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x39a0, 0x8000) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000080)=0x80000001) 17:07:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00Am\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:29 executing program 1: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) 17:07:29 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x440000, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000002c0)=""/255) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:29 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0x3a, &(0x7f0000000000)) 17:07:29 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x240200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x6be1, 0x6, 0x721420b8, 0x1, r0, 0x5}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1c00003057dc54ec315b6bfe7f9ff1b86fed000000be8a814563121bcd2ae39146007ae42c80d17228dc64865b0b629e96b2613ae2790c30d7622752f5d823a0e7bb68c1113b04b11e55ac1b363bcf8f8db4b8ac44546de009b785024a524c7fcf0407736098b4a9405a52043a5d2f5b1bc2d09359f5ccac6c9d978021bae999c270e2bf88bd70b2d073d1"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x50000, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000080)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r2, r1, 0xd}, 0x10) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000000c0)={0x6, 0x3ff}) 17:07:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback}}) 17:07:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00t\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:30 executing program 5: r0 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) ioctl(r0, 0xfffffffffffffffb, &(0x7f0000000000)) 17:07:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f00000002c0)=0xc) move_pages(r4, 0xa, &(0x7f0000000300)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000bfd000/0x400000)=nil, &(0x7f0000ce1000/0xf000)=nil, &(0x7f0000c1d000/0x3000)=nil, &(0x7f0000e23000/0x2000)=nil, &(0x7f0000d4b000/0x4000)=nil, &(0x7f0000e7b000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000f86000/0x1000)=nil], &(0x7f0000000380)=[0x10001], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) 17:07:30 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x10100, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000001bc0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000200), &(0x7f00000002c0)=0x4) rt_sigpending(&(0x7f00000001c0), 0x8) statfs(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) fcntl$setpipe(r0, 0x407, 0xffffffffffffffc3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r5, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 17:07:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500b40000000000"], 0x0, 0x1, 0x2f, &(0x7f0000000100)=""/251, 0x0, 0x1, [], 0x0, 0xd}, 0x48) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000002c0)) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000080)=0xf001) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r2, 0x14, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x48000}, 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xa, 0x4002) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={r1, r3, 0xf, 0x3}, 0xc8) read$alg(r0, &(0x7f0000000480)=""/104, 0x68) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x82000, 0x0) 17:07:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00z\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000c3000000478171093d784bd28ad32d002000130500e54f72ecf115d9c68301038782c607c97f702fb77192bce713b4c880f41ab2847969a80ee57b7f52e624d5948e78cbe6a708ea1ce807ff1ea8ce4ac369e85e0600b514bc11d26fab6de4af725b7a6f9654cdd35cc603311e5b5c12fda1a8c5947411a934cc5295a42d910b8d263ab0030bb4e9"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) clone(0x4080400, &(0x7f0000000340)="79381ee542de0a640c8eb1008ea4b01eec15efeff0e2", &(0x7f0000000300), &(0x7f00000002c0), &(0x7f00000004c0)="2e1e46a0b4403f12f8c9fdbac0ad7d4dd6980be45cf31bb78f9c4dfbec2bf40e66e9520ebdb778db49ae6f90a599a324d299b325652a9d3f7a9c6c6bbc3ad973f83a1c6f3ea52c233e8139c66b6d6604c867bb5f0e81ef142b366fb53bf53564fe6c1c68fd17799b96820ed966659cf7c906cba641fe27540fc97d4221b9a41d322d632083d19550f060de6e5ffae4b4bc8e109937c62d5fb3e09cf54a5a1f1811db662dc4b8c7bcdd015689b6a24b86c983067b77a0c4158e0fc1ffd5e4a0a885") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xe, 0x3}, 0xfd9e) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x200000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000340)={r3, 0x6, &(0x7f00000001c0)=[0x5, 0x665, 0xffffffffffffffff, 0x88ba, 0x7, 0x6], &(0x7f0000000200)=[0x7ff, 0x400], 0x45, 0x3, 0xffffffff, &(0x7f00000002c0)=[0xfffffffffffff143, 0xffffffffffffffc1, 0xff], &(0x7f0000000300)=[0x10000, 0x1c, 0x5, 0x6, 0x4]}) ioctl$CAPI_INSTALLED(r2, 0x80024322) 17:07:30 executing program 1: socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x1}, 0x18) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xffffffffffffffff, 0x80000000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x40141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000900)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f00000005c0)=r6) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="42cc8e153379883c5af5b814419f2b648b4d7ca459ac81c3e7da73ec9bf8a5d8ea61889b5ddfb139520e96b0c2476b5b317efe0807f2f5150703484d0509e6e9a83fc10bfec7ea9819b7bf5359ec266d20d62198312caf7189a81420255dff55940729f17c1ec4ae084cd1c29c360faa2d204b6bad1f4ac6cf2c673c7d762f9a821647f096fc02d74416f0e9622a6140afbe1a8c92cabba8e5222956a5"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r7, r5) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000740)=0xc) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="0000010000000030e1d035b385af2a8b4c360e9d91dd88977cdbf35dfd153e455765394e223dbbc577e9f4fb855eba75dbcacc22b7e70b0b40b0318748136eecea289e2b336969f629926144842fecf108038216ce33172a72792fc52a9913939dca8e9d0066"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r8, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) 17:07:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x80\x01\xa0\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 408.983015] bond0: Releasing backup interface bond_slave_1 17:07:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:30 executing program 4: socket(0xa, 0x100000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = semget$private(0x0, 0x3, 0x8) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) semtimedop(r0, &(0x7f00000001c0)=[{0x0, 0x1, 0x800}, {0x1, 0x4, 0x1800}, {0x2, 0x20, 0x1800}], 0x3, &(0x7f0000000380)={r1, r2+30000000}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x200, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) r5 = getegid() write$FUSE_CREATE_OPEN(r3, &(0x7f00000004c0)={0xa0, 0x0, 0x4, {{0x4, 0x0, 0x0, 0x8, 0x400, 0x5, {0x2, 0x101, 0x5, 0x9, 0x101, 0x7fffffff, 0x400, 0x3, 0x1f, 0x6564, 0xffffffff80000000, r4, r5, 0x2, 0x2}}, {0x0, 0x4}}}, 0xa0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) write$tun(r3, &(0x7f0000000580)={@val={0x0, 0xaaff}, @void, @llc={@snap={0x1, 0xab, "0e", "4ab124", 0x88e7, "9d9bead1e9021c75319e1bae43eb7bff991bce2954d0468af66ef9ae499eb17dda1d98cce5ff77620141fe6b0e46e674f90369d31e80c97e451a3879af957b23c2811700dad99b2e21"}}}, 0x55) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x0, 0x10}, 0xc) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty, 0x2000000000}, 0x1c) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000080)={r9, 0x7fffffff, 0x400, 0x3}, &(0x7f0000000180)=0x10) socket$kcm(0x29, 0x0, 0x0) dup(0xffffffffffffffff) 17:07:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000044842738ceb04afd95ff00000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\xc0\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x7fff, 0xfb, &(0x7f00000003c0)=""/251, 0x10000, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x101) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xff\xff\xff\xeb\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0x0, 0x2, 0x2, [], &(0x7f0000000100)={0xbb0bff, 0x7, [], @value64=0x10a2}}) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7, 0x20000) bind$bt_sco(r1, &(0x7f00000001c0)={0x1f, {0x6, 0x2, 0xffffffff, 0xfd1, 0x7, 0x8}}, 0x8) socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)=0x10001, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xa}, 0xfffffffffffffd92) 17:07:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000180)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r1, 0xd}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0xef63, @dev={0xfe, 0x80, [], 0x11}, 0xffff}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e21, 0x9, @rand_addr="67b6d5a8691469655eeed981aa9798a1", 0x8}, @in6={0xa, 0x4e22, 0x8, @rand_addr="5ba1ecc04edd2bb73243dda2eda4ef48", 0x3}], 0x94) 17:07:31 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xff\xff\xff\xfe\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000ba3a528704cb0ad18856925f000000eaffff0f0000951af0042a32000000275000000000000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 17:07:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:31 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:31 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xeb\xff\xff\xff\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) [ 410.147790] FAULT_INJECTION: forcing a failure. [ 410.147790] name failslab, interval 1, probability 0, space 0, times 0 [ 410.205989] CPU: 1 PID: 17324 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 410.213252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.222620] Call Trace: [ 410.225229] dump_stack+0x1db/0x2d0 [ 410.228877] ? dump_stack_print_info.cold+0x20/0x20 [ 410.233927] should_fail.cold+0xa/0x15 [ 410.237880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 410.243007] ? ___might_sleep+0x1e7/0x310 [ 410.247182] ? arch_local_save_flags+0x50/0x50 [ 410.251816] __should_failslab+0x121/0x190 [ 410.256072] should_failslab+0x9/0x14 [ 410.259907] __kmalloc+0x2dc/0x740 [ 410.263459] ? lock_acquire+0x1db/0x570 [ 410.267450] ? rw_copy_check_uvector+0x28c/0x330 [ 410.272230] rw_copy_check_uvector+0x28c/0x330 [ 410.276824] ? __check_object_size+0xa3/0x790 [ 410.281406] import_iovec+0xc1/0x2a0 [ 410.285141] ? dup_iter+0x260/0x260 [ 410.288777] ? _copy_from_user+0xdd/0x150 [ 410.292935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.298635] copy_msghdr_from_user+0x3b4/0x570 [ 410.303237] ? move_addr_to_kernel.part.0+0x110/0x110 [ 410.308448] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 410.313751] ___sys_sendmsg+0x132/0x910 [ 410.317742] ? copy_msghdr_from_user+0x570/0x570 [ 410.322506] ? iterate_fd+0x4b0/0x4b0 [ 410.326338] ? proc_fail_nth_write+0xa0/0x220 [ 410.330853] ? lock_downgrade+0x910/0x910 [ 410.335048] ? wait_for_completion+0x810/0x810 [ 410.339662] ? __fdget+0x1b/0x20 [ 410.343037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.348608] ? sockfd_lookup_light+0xc2/0x160 [ 410.353143] __sys_sendmsg+0x112/0x270 [ 410.357062] ? __ia32_sys_shutdown+0x80/0x80 [ 410.361498] ? do_syscall_64+0x8c/0x800 [ 410.365482] ? lockdep_hardirqs_on+0x415/0x5d0 [ 410.370087] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.375468] ? trace_hardirqs_off_caller+0x300/0x300 [ 410.380612] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.385399] __x64_sys_sendmsg+0x78/0xb0 [ 410.389473] do_syscall_64+0x1a3/0x800 [ 410.393372] ? syscall_return_slowpath+0x5f0/0x5f0 [ 410.398314] ? prepare_exit_to_usermode+0x232/0x3b0 [ 410.403350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.408216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.413412] RIP: 0033:0x457ec9 [ 410.416612] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.435528] RSP: 002b:00007f8f7d6c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 410.443254] RAX: ffffffffffffffda RBX: 00007f8f7d6c3c90 RCX: 0000000000457ec9 [ 410.450535] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 410.457831] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 410.465112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f7d6c46d4 [ 410.472392] R13: 00000000004c53b0 R14: 00000000004d8fc0 R15: 0000000000000005 [ 410.664276] protocol 88fb is buggy, dev hsr_slave_0 [ 410.669442] protocol 88fb is buggy, dev hsr_slave_1 [ 410.674635] protocol 88fb is buggy, dev hsr_slave_0 [ 410.679708] protocol 88fb is buggy, dev hsr_slave_1 [ 410.684855] protocol 88fb is buggy, dev hsr_slave_0 [ 410.689948] protocol 88fb is buggy, dev hsr_slave_1 [ 410.746294] protocol 88fb is buggy, dev hsr_slave_0 [ 410.751432] protocol 88fb is buggy, dev hsr_slave_1 17:07:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500200000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_vs\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000340)={r3, 0x7, &(0x7f00000001c0)=[0x6, 0x989, 0x58bc, 0x8, 0x7, 0x9, 0x8001], &(0x7f0000000200)=[0x6, 0xed3, 0xfffffffffffff97c, 0xf72d, 0xffffffffffffffff, 0x52], 0x40, 0x2, 0x1, &(0x7f00000002c0)=[0x100000001, 0x1], &(0x7f0000000300)=[0x7f16, 0x100000000, 0x800000000000000, 0x8000]}) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:32 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x2, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\xfe\xff\xff\xff\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:32 executing program 4 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:32 executing program 5: bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) 17:07:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5421, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x02\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 411.529296] FAULT_INJECTION: forcing a failure. [ 411.529296] name failslab, interval 1, probability 0, space 0, times 0 [ 411.541137] CPU: 0 PID: 17359 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 411.548339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.557692] Call Trace: [ 411.560292] dump_stack+0x1db/0x2d0 [ 411.563920] ? dump_stack_print_info.cold+0x20/0x20 [ 411.569073] ? ip6_route_redirect.isra.0+0x2a0/0x2a0 [ 411.574184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.579717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.585264] should_fail.cold+0xa/0x15 [ 411.589166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 411.594283] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.599043] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 411.604506] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 411.609097] ? retint_kernel+0x2d/0x2d [ 411.612985] ? trace_hardirqs_on_caller+0xc0/0x310 [ 411.617949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.622706] __should_failslab+0x121/0x190 [ 411.626956] should_failslab+0x9/0x14 [ 411.630756] kmem_cache_alloc+0x47/0x710 [ 411.634869] ? dst_alloc+0x2a/0x1d0 [ 411.638499] dst_alloc+0x10e/0x1d0 [ 411.642041] ip6_dst_alloc+0x34/0xa0 [ 411.645778] ip6_pol_route+0x73c/0x1490 [ 411.649784] ? ip6_pol_route_lookup+0x1020/0x1020 [ 411.654638] ? pinned_sched_in+0xcb0/0xcb0 [ 411.658880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.663661] ? add_lock_to_list.isra.0+0x450/0x450 [ 411.668613] ? retint_kernel+0x2d/0x2d [ 411.672504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.677289] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 411.682804] ? l3mdev_link_scope_lookup+0x23d/0x360 [ 411.687835] ip6_pol_route_output+0x54/0x70 [ 411.692217] fib6_rule_lookup+0x277/0x870 [ 411.696372] ? ip6_pol_route_input+0x80/0x80 [ 411.700797] ? fib6_lookup+0x4e0/0x4e0 [ 411.704686] ? rcu_read_unlock_special+0x380/0x380 [ 411.709661] ? l3mdev_link_scope_lookup+0x242/0x360 [ 411.715173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.720725] ip6_route_output_flags+0x2c4/0x350 [ 411.725493] ip6_dst_lookup_tail+0xe18/0x1d50 [ 411.730007] ? rcu_read_unlock_special+0x380/0x380 [ 411.734942] ? rcu_softirq_qs+0x20/0x20 [ 411.738920] ? ip6_append_data+0x2e0/0x2e0 [ 411.743158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.747914] ? lockdep_hardirqs_on+0x415/0x5d0 [ 411.752501] ? retint_kernel+0x2d/0x2d [ 411.756386] ? trace_hardirqs_on_caller+0xc0/0x310 [ 411.761319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.766099] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 411.771627] ? rawv6_sendmsg+0x9a1/0x49e0 [ 411.775794] ? find_held_lock+0x35/0x120 [ 411.779871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.784664] ip6_dst_lookup_flow+0xca/0x270 [ 411.789035] ? ip6_dst_lookup+0x70/0x70 [ 411.793032] rawv6_sendmsg+0xebc/0x49e0 [ 411.797071] ? compat_rawv6_getsockopt+0x150/0x150 [ 411.802011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.806784] ? lockdep_hardirqs_on+0x415/0x5d0 [ 411.811365] ? retint_kernel+0x2d/0x2d [ 411.815255] ? trace_hardirqs_on_caller+0xc0/0x310 [ 411.820189] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 411.825657] ? retint_kernel+0x2d/0x2d [ 411.829554] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.834354] ? smack_socket_getpeersec_stream+0x1c0/0x1c0 [ 411.839959] inet_sendmsg+0x1af/0x740 [ 411.843781] ? compat_rawv6_getsockopt+0x150/0x150 [ 411.848712] ? inet_sendmsg+0x1af/0x740 [ 411.852689] ? ipip_gro_receive+0x100/0x100 [ 411.857035] ? smack_socket_sendmsg+0xb1/0x1a0 [ 411.861661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.867200] ? security_socket_sendmsg+0x93/0xc0 [ 411.871957] ? ipip_gro_receive+0x100/0x100 [ 411.876303] sock_sendmsg+0xdd/0x130 [ 411.880023] ___sys_sendmsg+0x7ec/0x910 [ 411.884030] ? copy_msghdr_from_user+0x570/0x570 [ 411.888801] ? iterate_fd+0x4b0/0x4b0 [ 411.892615] ? lock_downgrade+0x910/0x910 [ 411.896784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.901545] ? __fdget+0x1b/0x20 [ 411.904907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.910459] ? sockfd_lookup_light+0xc2/0x160 [ 411.914969] __sys_sendmsg+0x112/0x270 [ 411.918855] ? __ia32_sys_shutdown+0x80/0x80 [ 411.923294] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.928102] __x64_sys_sendmsg+0x78/0xb0 [ 411.932178] ? do_syscall_64+0xbc/0x800 [ 411.936154] do_syscall_64+0x1a3/0x800 [ 411.940071] ? syscall_return_slowpath+0x5f0/0x5f0 [ 411.945008] ? prepare_exit_to_usermode+0x232/0x3b0 [ 411.950034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.954898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.960092] RIP: 0033:0x457ec9 [ 411.963285] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.982191] RSP: 002b:00007f8f7d6c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 411.989906] RAX: ffffffffffffffda RBX: 00007f8f7d6c3c90 RCX: 0000000000457ec9 [ 411.997184] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 412.004456] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 412.011728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f7d6c46d4 [ 412.019013] R13: 00000000004c53b0 R14: 00000000004d8fc0 R15: 0000000000000005 17:07:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000013000000ff0700000000ff00000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x101400, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202e2f6367725a0f30a3"], 0xe) syz_execute_func(&(0x7f00000002c0)="430f181d060000008fe878c2dcc10f9f51406765664c0f3a22d9000f38cdc0c422a9b68903000000c4e18576b142a40000c4827d18480066410f3821b9fcffffffc4827d2513") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000340)='systemcgroup\x00') r3 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f00000005c0)="b47d3e3dbf", 0x5, 0xfffffffffffffffb) keyctl$invalidate(0x15, r3) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x5, 0x4, 0x1000, 0xd5df, 0x0, 0x6c2, 0x800, 0xf, 0x4, 0xfac, 0x7, 0x2, 0xfff, 0x2, 0x4, 0x800, 0x3f, 0x5, 0x1, 0xa00000, 0x7fffffff, 0x2, 0xcfbc, 0x100000001, 0x1, 0x5, 0x10001, 0xff, 0x8000, 0x6, 0x739, 0x2, 0x2, 0x3f, 0x401, 0x5, 0x0, 0x100000001, 0x4, @perf_bp={&(0x7f0000000380)}, 0x20, 0x100, 0x3f, 0x7, 0x0, 0x7, 0xff}, r2, 0xffffffffffffffff, r1, 0x6) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:33 executing program 5: bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) [ 412.035233] protocol 88fb is buggy, dev hsr_slave_0 [ 412.040327] protocol 88fb is buggy, dev hsr_slave_1 17:07:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5450, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5451, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000001ef0"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:33 executing program 5: bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) 17:07:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5452, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:34 executing program 4 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:34 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080), 0x10) 17:07:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20001, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000100)={0x0, {}, 0x7f, 0x6}) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x04\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5460, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x2, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8901, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\'\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:34 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080), 0x10) 17:07:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001640)='/dev/dsp\x00', 0x400a43, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000001680)=0x400, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = openat(r2, &(0x7f0000000100)='./file0\x00', 0x8080, 0x18b) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000180)={'hwsim0\x00', 0x10000}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) [ 412.685763] FAULT_INJECTION: forcing a failure. [ 412.685763] name failslab, interval 1, probability 0, space 0, times 0 [ 412.787834] CPU: 0 PID: 17398 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 412.795083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.804464] Call Trace: [ 412.807106] dump_stack+0x1db/0x2d0 [ 412.810757] ? dump_stack_print_info.cold+0x20/0x20 [ 412.815811] ? ___ratelimit+0xac/0x686 [ 412.819713] ? ___ratelimit+0xdd/0x686 [ 412.823622] should_fail.cold+0xa/0x15 [ 412.827522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 412.832643] ? ___might_sleep+0x1e7/0x310 17:07:34 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080), 0x10) [ 412.836822] ? arch_local_save_flags+0x50/0x50 [ 412.841419] ? retint_kernel+0x2d/0x2d [ 412.845464] __should_failslab+0x121/0x190 [ 412.849706] should_failslab+0x9/0x14 [ 412.853512] kmem_cache_alloc_node_trace+0x270/0x720 [ 412.858631] ? lock_is_held_type+0x17e/0x210 [ 412.863077] __kmalloc_node_track_caller+0x3d/0x70 [ 412.868027] __kmalloc_reserve.isra.0+0x40/0xe0 [ 412.872724] __alloc_skb+0x12d/0x730 [ 412.876453] ? skb_scrub_packet+0x440/0x440 [ 412.880786] ? retint_kernel+0x2d/0x2d [ 412.884722] __ip6_append_data.isra.0+0x2ed9/0x3f20 [ 412.889758] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 412.894791] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 412.900278] ? dst_output+0x180/0x180 [ 412.904134] ip6_append_data+0x1bd/0x2e0 [ 412.908205] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 412.913239] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 412.918279] rawv6_sendmsg+0x1b2f/0x49e0 [ 412.922376] ? compat_rawv6_getsockopt+0x150/0x150 [ 412.927333] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 412.932117] ? retint_kernel+0x2d/0x2d [ 412.936024] ? rw_copy_check_uvector+0x265/0x330 [ 412.940811] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 412.945582] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 412.950645] ? rw_copy_check_uvector+0x2a6/0x330 [ 412.955432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 412.960203] ? lockdep_hardirqs_on+0x415/0x5d0 [ 412.964802] ? trace_hardirqs_on_caller+0xc0/0x310 [ 412.969789] ? smack_socket_getpeersec_stream+0x1c0/0x1c0 [ 412.975352] inet_sendmsg+0x1af/0x740 [ 412.979167] ? compat_rawv6_getsockopt+0x150/0x150 [ 412.984111] ? inet_sendmsg+0x1af/0x740 [ 412.988123] ? ipip_gro_receive+0x100/0x100 [ 412.992453] ? smack_socket_sendmsg+0xb1/0x1a0 [ 412.997050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.002612] ? security_socket_sendmsg+0x93/0xc0 [ 413.007382] ? ipip_gro_receive+0x100/0x100 [ 413.011714] sock_sendmsg+0xdd/0x130 [ 413.015442] ___sys_sendmsg+0x7ec/0x910 [ 413.019435] ? copy_msghdr_from_user+0x570/0x570 [ 413.024199] ? iterate_fd+0x4b0/0x4b0 [ 413.028026] ? lock_downgrade+0x910/0x910 [ 413.032231] ? wait_for_completion+0x810/0x810 [ 413.036833] ? __fdget+0x1b/0x20 [ 413.040203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.045746] ? sockfd_lookup_light+0xc2/0x160 [ 413.050268] __sys_sendmsg+0x112/0x270 [ 413.054168] ? __ia32_sys_shutdown+0x80/0x80 [ 413.058609] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.063980] ? trace_hardirqs_off_caller+0x300/0x300 [ 413.069187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.073959] __x64_sys_sendmsg+0x78/0xb0 [ 413.078031] do_syscall_64+0x1a3/0x800 [ 413.081944] ? syscall_return_slowpath+0x5f0/0x5f0 [ 413.086883] ? prepare_exit_to_usermode+0x232/0x3b0 [ 413.091912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.096790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.101985] RIP: 0033:0x457ec9 [ 413.105188] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.124098] RSP: 002b:00007f8f7d6c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 413.131805] RAX: ffffffffffffffda RBX: 00007f8f7d6c3c90 RCX: 0000000000457ec9 17:07:34 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) [ 413.139093] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 413.146361] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 413.153628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f7d6c46d4 [ 413.160896] R13: 00000000004c53b0 R14: 00000000004d8fc0 R15: 0000000000000005 17:07:34 executing program 4 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8902, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:34 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000bb08825477b4726d25f4e2fd96000000429fd5937298d8071b58ccf70f3009806484654354218f7a6ebfa6be43ac3ea959166434ff7cb967adf400e5c70203bb532c7bed776fd75093877c8809adb3dc2cf3ab7f78cf37e7248f158a57131cb05ecab17894191548a4c627de9b147843d8bb898a8f805fe2940af234325777b2b8611fec9f9a9404232ad562f6b673643a99fcef722bb49b24ef847f5d6d50"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x3dd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00/\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x3, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x111000, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8903, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:35 executing program 5: bpf$BPF_PROG_ATTACH(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00H\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 413.611410] FAULT_INJECTION: forcing a failure. [ 413.611410] name failslab, interval 1, probability 0, space 0, times 0 [ 413.672246] CPU: 0 PID: 17431 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 413.679477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.688844] Call Trace: [ 413.691452] dump_stack+0x1db/0x2d0 [ 413.695123] ? dump_stack_print_info.cold+0x20/0x20 [ 413.700152] ? trace_hardirqs_on_caller+0xc0/0x310 [ 413.705107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.709886] should_fail.cold+0xa/0x15 [ 413.713801] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.718928] ? ___might_sleep+0x1e7/0x310 [ 413.723101] ? arch_local_save_flags+0x50/0x50 [ 413.727761] __should_failslab+0x121/0x190 [ 413.732007] should_failslab+0x9/0x14 [ 413.735813] kmem_cache_alloc_node+0x265/0x710 [ 413.740417] __alloc_skb+0xf4/0x730 [ 413.744099] ? skb_scrub_packet+0x440/0x440 [ 413.748435] ? retint_kernel+0x2d/0x2d [ 413.752361] __ip6_append_data.isra.0+0x2ed9/0x3f20 [ 413.757409] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 413.762460] ? dst_output+0x180/0x180 [ 413.766273] ? ip6_setup_cork+0x136e/0x1ae0 [ 413.770615] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 413.775465] ? lockdep_hardirqs_on+0x415/0x5d0 [ 413.780071] ? trace_hardirqs_on+0xbd/0x310 [ 413.784409] ? lock_sock_nested+0xe2/0x120 [ 413.788661] ip6_append_data+0x1bd/0x2e0 [ 413.792748] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 413.797779] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 413.802814] rawv6_sendmsg+0x1b2f/0x49e0 [ 413.806924] ? compat_rawv6_getsockopt+0x150/0x150 [ 413.811871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.816643] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.821407] ? lockdep_hardirqs_on+0x415/0x5d0 [ 413.825997] ? retint_kernel+0x2d/0x2d [ 413.829886] ? trace_hardirqs_on_caller+0xc0/0x310 [ 413.834854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.839630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.844406] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 413.849888] ? retint_kernel+0x2d/0x2d [ 413.853803] ? trace_hardirqs_on_caller+0xc0/0x310 [ 413.858771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.863538] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.868323] ? compat_rawv6_getsockopt+0x150/0x150 [ 413.873273] inet_sendmsg+0x1af/0x740 [ 413.877089] ? compat_rawv6_getsockopt+0x150/0x150 [ 413.882064] ? inet_sendmsg+0x1af/0x740 [ 413.886064] ? ipip_gro_receive+0x100/0x100 [ 413.890414] ? smack_socket_sendmsg+0xb1/0x1a0 [ 413.894999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.900538] ? security_socket_sendmsg+0x93/0xc0 [ 413.905304] ? ipip_gro_receive+0x100/0x100 [ 413.909635] sock_sendmsg+0xdd/0x130 [ 413.913363] ___sys_sendmsg+0x7ec/0x910 [ 413.917365] ? copy_msghdr_from_user+0x570/0x570 [ 413.922133] ? iterate_fd+0x4b0/0x4b0 [ 413.925950] ? proc_fail_nth_write+0xa0/0x220 [ 413.930461] ? lock_downgrade+0x910/0x910 [ 413.934653] ? wait_for_completion+0x810/0x810 [ 413.939266] ? __fdget+0x1b/0x20 [ 413.942667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.948213] ? sockfd_lookup_light+0xc2/0x160 [ 413.952745] __sys_sendmsg+0x112/0x270 [ 413.956639] ? __ia32_sys_shutdown+0x80/0x80 [ 413.961090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.966463] ? trace_hardirqs_off_caller+0x300/0x300 [ 413.971582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.976358] __x64_sys_sendmsg+0x78/0xb0 [ 413.980434] do_syscall_64+0x1a3/0x800 [ 413.984332] ? syscall_return_slowpath+0x5f0/0x5f0 [ 413.989279] ? prepare_exit_to_usermode+0x232/0x3b0 [ 413.994311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.999171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.004369] RIP: 0033:0x457ec9 17:07:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8904, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) [ 414.007565] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.026474] RSP: 002b:00007f8f7d6c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 414.034190] RAX: ffffffffffffffda RBX: 00007f8f7d6c3c90 RCX: 0000000000457ec9 [ 414.041463] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 414.048733] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 414.056018] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f7d6c46d4 [ 414.063287] R13: 00000000004c53b0 R14: 00000000004d8fc0 R15: 0000000000000005 17:07:35 executing program 5: bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:35 executing program 4 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8906, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00L\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000101aec8d6ced7b2b8d81000e00000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) openat$cgroup_int(r1, &(0x7f0000000100)='memory.swap.max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x1ff) 17:07:35 executing program 5: bpf$BPF_PROG_ATTACH(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) [ 414.436981] FAULT_INJECTION: forcing a failure. [ 414.436981] name failslab, interval 1, probability 0, space 0, times 0 [ 414.460869] CPU: 1 PID: 17466 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 414.468093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.477450] Call Trace: [ 414.480053] dump_stack+0x1db/0x2d0 [ 414.483709] ? dump_stack_print_info.cold+0x20/0x20 [ 414.488729] ? save_stack+0x45/0xd0 [ 414.492355] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 414.497459] ? kasan_slab_alloc+0xf/0x20 [ 414.501527] ? kmem_cache_alloc_node+0x144/0x710 [ 414.506285] ? __alloc_skb+0xf4/0x730 [ 414.510100] ? ip6_append_data+0x1bd/0x2e0 [ 414.514344] should_fail.cold+0xa/0x15 [ 414.518237] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.523345] ? ___might_sleep+0x1e7/0x310 [ 414.527500] ? arch_local_save_flags+0x50/0x50 [ 414.532086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.537620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.543160] __should_failslab+0x121/0x190 [ 414.547399] should_failslab+0x9/0x14 [ 414.551199] kmem_cache_alloc_node_trace+0x270/0x720 [ 414.556304] ? __alloc_skb+0xf4/0x730 [ 414.560111] __kmalloc_node_track_caller+0x3d/0x70 [ 414.565045] __kmalloc_reserve.isra.0+0x40/0xe0 [ 414.569729] __alloc_skb+0x12d/0x730 [ 414.573497] ? skb_scrub_packet+0x440/0x440 [ 414.577836] ? ip6_mtu+0x39c/0x520 [ 414.581381] ? raw6_getfrag+0x164/0x230 [ 414.585356] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 414.590381] __ip6_append_data.isra.0+0x2ed9/0x3f20 [ 414.595401] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 414.600417] ? ip6_mtu+0x160/0x520 [ 414.603970] ? dst_output+0x180/0x180 [ 414.607773] ? ip6_setup_cork+0x136e/0x1ae0 [ 414.612111] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 414.616952] ? lockdep_hardirqs_on+0x415/0x5d0 [ 414.621563] ? trace_hardirqs_on+0xbd/0x310 [ 414.625893] ? lock_sock_nested+0xe2/0x120 [ 414.630136] ip6_append_data+0x1bd/0x2e0 [ 414.634216] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 414.639249] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 414.644278] rawv6_sendmsg+0x1b2f/0x49e0 [ 414.648359] ? compat_rawv6_getsockopt+0x150/0x150 [ 414.653295] ? lock_release+0xc40/0xc40 [ 414.657286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.662825] ? _copy_from_user+0xdd/0x150 [ 414.666981] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 414.672002] ? rw_copy_check_uvector+0x2a6/0x330 [ 414.676765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.682304] ? iov_iter_init+0xea/0x220 [ 414.686301] ? smack_socket_getpeersec_stream+0x1c0/0x1c0 [ 414.691861] inet_sendmsg+0x1af/0x740 [ 414.695663] ? compat_rawv6_getsockopt+0x150/0x150 [ 414.700598] ? inet_sendmsg+0x1af/0x740 [ 414.704586] ? ipip_gro_receive+0x100/0x100 [ 414.708909] ? smack_socket_sendmsg+0xb1/0x1a0 [ 414.713632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.719172] ? security_socket_sendmsg+0x93/0xc0 [ 414.723935] ? ipip_gro_receive+0x100/0x100 [ 414.728264] sock_sendmsg+0xdd/0x130 [ 414.731982] ___sys_sendmsg+0x7ec/0x910 [ 414.735968] ? copy_msghdr_from_user+0x570/0x570 [ 414.740726] ? iterate_fd+0x4b0/0x4b0 [ 414.744536] ? proc_fail_nth_write+0xa0/0x220 [ 414.749041] ? lock_downgrade+0x910/0x910 [ 414.753222] ? wait_for_completion+0x810/0x810 [ 414.757812] ? __fdget+0x1b/0x20 [ 414.761180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.766718] ? sockfd_lookup_light+0xc2/0x160 [ 414.771220] __sys_sendmsg+0x112/0x270 [ 414.775133] ? __ia32_sys_shutdown+0x80/0x80 [ 414.779555] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.784929] ? trace_hardirqs_off_caller+0x300/0x300 [ 414.790039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.794813] __x64_sys_sendmsg+0x78/0xb0 [ 414.798883] do_syscall_64+0x1a3/0x800 [ 414.802774] ? syscall_return_slowpath+0x5f0/0x5f0 [ 414.807708] ? prepare_exit_to_usermode+0x232/0x3b0 [ 414.812737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.817606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.822798] RIP: 0033:0x457ec9 [ 414.825994] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.845426] RSP: 002b:00007f8f7d6c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 414.853144] RAX: ffffffffffffffda RBX: 00007f8f7d6c3c90 RCX: 0000000000457ec9 [ 414.860423] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 414.867708] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 414.874987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f7d6c46d4 [ 414.882261] R13: 00000000004c53b0 R14: 00000000004d8fc0 R15: 0000000000000005 17:07:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x4, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:36 executing program 5: bpf$BPF_PROG_ATTACH(0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8907, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00h\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:36 executing program 4 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:36 executing program 5: bpf$BPF_PROG_ATTACH(0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00l\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 415.243974] FAULT_INJECTION: forcing a failure. [ 415.243974] name failslab, interval 1, probability 0, space 0, times 0 17:07:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x890b, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) [ 415.314884] CPU: 0 PID: 17483 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 415.322186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.331545] Call Trace: [ 415.334153] dump_stack+0x1db/0x2d0 [ 415.337803] ? dump_stack_print_info.cold+0x20/0x20 [ 415.342838] ? __x64_sys_sendmsg+0x78/0xb0 [ 415.347094] ? do_syscall_64+0x1a3/0x800 [ 415.351176] should_fail.cold+0xa/0x15 [ 415.355087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.360213] ? ___might_sleep+0x1e7/0x310 [ 415.364370] ? arch_local_save_flags+0x50/0x50 [ 415.368974] __should_failslab+0x121/0x190 [ 415.373222] should_failslab+0x9/0x14 [ 415.377040] kmem_cache_alloc_node+0x265/0x710 [ 415.381638] ? __kmalloc_node_track_caller+0x4e/0x70 [ 415.386749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.392303] __alloc_skb+0xf4/0x730 [ 415.395944] ? skb_scrub_packet+0x440/0x440 [ 415.400274] ? retint_kernel+0x2d/0x2d [ 415.404181] ? raw6_getfrag+0x164/0x230 [ 415.408158] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 415.413192] __ip6_append_data.isra.0+0x2ed9/0x3f20 [ 415.418233] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 415.423262] ? ip6_mtu+0x160/0x520 [ 415.426823] ? dst_output+0x180/0x180 [ 415.430629] ? ip6_setup_cork+0x136e/0x1ae0 [ 415.434965] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 415.439846] ? preempt_schedule+0x4b/0x60 [ 415.443997] ? preempt_schedule_common+0x4f/0xe0 [ 415.448756] ? lock_sock_nested+0x9a/0x120 [ 415.453007] ip6_append_data+0x1bd/0x2e0 [ 415.457086] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 415.462122] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 415.467152] rawv6_sendmsg+0x1b2f/0x49e0 [ 415.471252] ? compat_rawv6_getsockopt+0x150/0x150 [ 415.476190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.480959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.485737] ? retint_kernel+0x2d/0x2d [ 415.489647] ? rw_copy_check_uvector+0x24c/0x330 [ 415.494407] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 415.499256] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 415.504280] ? rw_copy_check_uvector+0x2a6/0x330 [ 415.509102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.514652] ? iov_iter_init+0xea/0x220 [ 415.518669] ? smack_socket_getpeersec_stream+0x1c0/0x1c0 [ 415.524221] inet_sendmsg+0x1af/0x740 [ 415.528025] ? compat_rawv6_getsockopt+0x150/0x150 [ 415.532971] ? inet_sendmsg+0x1af/0x740 [ 415.536957] ? ipip_gro_receive+0x100/0x100 [ 415.541287] ? smack_socket_sendmsg+0xb1/0x1a0 [ 415.545911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.551464] ? security_socket_sendmsg+0x93/0xc0 [ 415.556231] ? ipip_gro_receive+0x100/0x100 [ 415.560561] sock_sendmsg+0xdd/0x130 [ 415.564288] ___sys_sendmsg+0x7ec/0x910 [ 415.568280] ? copy_msghdr_from_user+0x570/0x570 [ 415.573041] ? iterate_fd+0x4b0/0x4b0 [ 415.576879] ? lock_downgrade+0x910/0x910 [ 415.581033] ? proc_fail_nth_write+0xcf/0x220 [ 415.585574] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.590349] ? __fdget+0x1b/0x20 [ 415.593745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.599307] ? sockfd_lookup_light+0xc2/0x160 [ 415.603812] __sys_sendmsg+0x112/0x270 [ 415.607710] ? __ia32_sys_shutdown+0x80/0x80 [ 415.612129] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.616929] __x64_sys_sendmsg+0x78/0xb0 [ 415.620998] ? do_syscall_64+0xbc/0x800 [ 415.625015] do_syscall_64+0x1a3/0x800 [ 415.628916] ? syscall_return_slowpath+0x5f0/0x5f0 [ 415.633853] ? prepare_exit_to_usermode+0x232/0x3b0 [ 415.638887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.643749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.648942] RIP: 0033:0x457ec9 [ 415.652139] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.671049] RSP: 002b:00007f8f7d6c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 415.678782] RAX: ffffffffffffffda RBX: 00007f8f7d6c3c90 RCX: 0000000000457ec9 [ 415.686063] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 415.693345] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 415.700617] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f7d6c46d4 [ 415.707895] R13: 00000000004c53b0 R14: 00000000004d8fc0 R15: 0000000000000005 17:07:37 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ipddp0\x00', 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='syzfaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x41000, 0x0, [], r0, 0x9}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x890c, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:37 executing program 5: bpf$BPF_PROG_ATTACH(0x7, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x5, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00t\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x890d, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:37 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:37 executing program 5: bpf$BPF_PROG_ATTACH(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8914, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00z\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) accept(r1, &(0x7f00000001c0)=@rc, &(0x7f0000000080)=0x80) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000180)={r1, r0, 0x8000000000b}, 0x10) 17:07:38 executing program 5: bpf$BPF_PROG_ATTACH(0xb, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x1, 0xffffffffffffff8e, &(0x7f00000003c0)=""/251, 0x41f00, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) [ 416.903993] net_ratelimit: 22 callbacks suppressed [ 416.904002] protocol 88fb is buggy, dev hsr_slave_0 [ 416.914189] protocol 88fb is buggy, dev hsr_slave_1 [ 416.919385] protocol 88fb is buggy, dev hsr_slave_0 [ 416.924524] protocol 88fb is buggy, dev hsr_slave_1 [ 416.929658] protocol 88fb is buggy, dev hsr_slave_0 [ 416.934839] protocol 88fb is buggy, dev hsr_slave_1 17:07:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x6, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\xc0\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:38 executing program 5: bpf$BPF_PROG_ATTACH(0xc, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8915, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:38 executing program 5: bpf$BPF_PROG_ATTACH(0xd, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x20000262, &(0x7f0000000180)=ANY=[@ANYRES64], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) munlock(&(0x7f0000fec000/0x12000)=nil, 0x12000) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r3 = gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={r2, r2, 0x7, 0x2}, 0x10) migrate_pages(r3, 0x80000001, &(0x7f0000000100), &(0x7f00000002c0)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000004c0)={{0x7, 0x0, 0x400, 0x6, 'syz1\x00', 0x6}, 0x6, 0x20000040, 0x9, r3, 0x3, 0x5, 'syz0\x00', &(0x7f0000000340)=['user[\x00', '+.lo].\x00', 'nodev\x00'], 0x13, [], [0x0, 0x0, 0x99f, 0x40000000000]}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000840)={0x0, @dev, @empty}, &(0x7f0000000880)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xc, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5cc4, 0x0, 0x0, 0x0, 0x8000}, @exit, @map={0x18, 0xa, 0x1, 0x0, r2}, @map={0x18, 0x3, 0x1, 0x0, r2}, @map={0x18, 0xb, 0x1, 0x0, r2}, @ldst={0x3, 0x3, 0x0, 0x8, 0x7, 0xffffffffffffffe0, 0xfffffffffffffff8}]}, &(0x7f0000000380)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x1, [], r4, 0xb}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) [ 417.303963] protocol 88fb is buggy, dev hsr_slave_0 [ 417.309131] protocol 88fb is buggy, dev hsr_slave_1 17:07:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00 \x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x7, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:39 executing program 5: bpf$BPF_PROG_ATTACH(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='grov\xe8s\x16\x19\xab\xc0up\x00\x00et/syz0\x00\x00\x00\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8919, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\'\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:39 executing program 5: bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00/\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 418.286017] protocol 88fb is buggy, dev hsr_slave_0 [ 418.291139] protocol 88fb is buggy, dev hsr_slave_1 17:07:39 executing program 0: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000d40)={@mcast1}, &(0x7f0000000d80)=0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000020000"], &(0x7f0000000140)='syzkaller\x00', 0x80001, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0xffffffffffffff5d) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xa) 17:07:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x8, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:40 executing program 5: bpf$BPF_PROG_ATTACH(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00mA\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000002cec00000000009500000000000000a1007fcb942853befdb0a5d9de848d034b6d4b6fffe9bebfe80d02d16bbcae295f4b198003d175e28c01bcf1442c2bdefbf676085c4b4b7654addf78abe85e8c11c3c3a328d24acc4c9c9909253e7ee10c252308e42039cc7e0000efd1ca9bb849adc48848f7fa7676cf78a4e5ccf61d6a4bbffef5f519d8055d43c8f1627386541b69be2fb705a251b1a2f0c9fc6f3f4ff671db33bda5c4854467cadb9583179f7da6356a33e58fb8c7512657ab23de63bebd623a3af0"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x891b, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000004bc2e9810000000000000000009500000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000180)={r1, r0}, 0xfffffffffffffe02) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 17:07:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x891c, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:40 executing program 5: bpf$BPF_PROG_ATTACH(0x11, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00H\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8934, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x9, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:41 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x42) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r1, 0x4}}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:41 executing program 5: bpf$BPF_PROG_ATTACH(0x12, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00L\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8935, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:41 executing program 5: bpf$BPF_PROG_ATTACH(0x13, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8940, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00h\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000c00)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x4}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x10000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x8000000000c}, 0x10) r4 = add_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$search(0xa, r4, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x1, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) 17:07:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8941, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xa, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:41 executing program 5: bpf$BPF_PROG_ATTACH(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00l\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:41 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'veth1_to_bridge\x00', 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000aec4bf2aaced27ea0000000076bb25e3b9e341063f77fc4a42325424e1d8b15318e4a1021bca2608635a637560637441f0149ed06ce12fcc74a1734ea10a37b68f1b45820444e6c8b7c3a154c6e1cebfe925c7e9f17bb274ca520d775739dc45aff93913b98d9383485cdc2377456522100c3a93ae1b450933acf4"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r0, 0xe}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) r3 = dup(r2) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000000c0)=r1) 17:07:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x894c, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cgroup\x00') ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000002c0)={@null=' \x00', 0x2, 'syzkaller1\x00'}) 17:07:42 executing program 5: bpf$BPF_PROG_ATTACH(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) 17:07:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8953, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00Am\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000300)={0x0, 0x2}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r3, 0x100000000}, 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r4, 0xe01a, 0x1}, &(0x7f00000002c0)=0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:42 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000002}, 0x10) 17:07:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xb, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8955, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00t\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:42 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000003}, 0x10) 17:07:42 executing program 0: r0 = shmget(0x1, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)=""/8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8980, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:42 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000004}, 0x10) 17:07:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00z\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8981, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8982, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:43 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000005}, 0x10) 17:07:43 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000100)='./cgroup\x00', 0xffffffffffffffff}, 0x30) migrate_pages(r0, 0x6, &(0x7f00000001c0)=0x1, &(0x7f0000000200)=0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x81, 0x0, @tid=r0}, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f0000000380)={{r4, r5+30000000}}, &(0x7f00000004c0)) 17:07:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x11, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xc, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\xc0\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:43 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000006}, 0x10) 17:07:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8983, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\xa0\x01\x80\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x9, 0x1, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x1000, 0x5, 0x3, 0x0, 0x0, 0x4}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0xfffffffffffffffc, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x40800, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000280)='team_slave_1\x00') execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='./cgroup\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='./cgroup\x00'], &(0x7f0000000580)=[&(0x7f0000000300)='./cgroup\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='[eth1selinuxposix_acl_access\x00', &(0x7f00000004c0)='trusted\x00', &(0x7f0000000500)='systemtrustedmime_typeem0ppp1/\xeeusereth0nodev\xcb%security]o\x00', &(0x7f0000000540)='+\x00']) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:43 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000007}, 0x10) 17:07:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x13, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x89a0, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:43 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bind(r0, &(0x7f00000002c0)=@pptp={0x18, 0x2, {0x2, @remote}}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e21, 0x81, @empty, 0x7fff}, {0xa, 0x4e20, 0xfffffffffffffffd, @rand_addr="44a6e6b379aaf587eba22c19dd48fc8c", 0x3}, 0x3, [0x9, 0x5, 0x3, 0x8, 0x800000000000, 0x1, 0x132da5ab, 0x3]}, 0x5c) signalfd(r1, &(0x7f0000000040)={0x2}, 0x8) 17:07:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x89a1, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x01T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') [ 422.423954] net_ratelimit: 14 callbacks suppressed [ 422.423962] protocol 88fb is buggy, dev hsr_slave_0 [ 422.434091] protocol 88fb is buggy, dev hsr_slave_1 [ 422.508491] protocol 88fb is buggy, dev hsr_slave_0 [ 422.513575] protocol 88fb is buggy, dev hsr_slave_1 17:07:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xd, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:44 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000008}, 0x10) 17:07:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x60, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x40049409, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x02T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x4020940d, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:44 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000b}, 0x10) 17:07:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x04T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0xc0045878, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xc, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) [ 423.150006] protocol 88fb is buggy, dev hsr_slave_0 [ 423.155192] protocol 88fb is buggy, dev hsr_slave_1 [ 423.160329] protocol 88fb is buggy, dev hsr_slave_0 [ 423.165458] protocol 88fb is buggy, dev hsr_slave_1 [ 423.170604] protocol 88fb is buggy, dev hsr_slave_0 [ 423.175735] protocol 88fb is buggy, dev hsr_slave_1 17:07:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xe, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:45 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000c}, 0x10) 17:07:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0xc0045878, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00 T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:45 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000d}, 0x10) 17:07:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0xc0189436, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\'T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x103, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:45 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000e}, 0x10) 17:07:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0xc020660b, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 17:07:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0xf, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00/T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1f4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:45 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000f}, 0x10) 17:07:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\xff\xff\xfd\xfd\x00', {0x2, 0x0, @loopback}}) 17:07:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x9, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 17:07:46 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x70) 17:07:46 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x20000090) 17:07:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'lo\xfd\xfd\xff\xff\x00', {0x2, 0x0, @loopback}}) 17:07:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2dc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 17:07:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00HT\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 17:07:46 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000000)='/\x00', 0x0}, 0x30) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x40, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000140)={0xf, 0x2, 0x40000007, {0xffffffff, 0x80c43, 0xffffffff}}) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000180)=0x51) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r0, 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x80000000011}, 0x10) [ 424.864849] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: rcu_dynticks_curr_cpu_in_eqs+0x169/0x170 [ 424.876520] CPU: 1 PID: 17907 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #27 [ 424.883755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.893113] Call Trace: [ 424.896935] Kernel Offset: disabled [ 424.900564] Rebooting in 86400 seconds..