, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5425, 0x0) 19:53:00 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000400)=@newqdisc={0xac, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x7c, 0x2, {{}, [@TCA_NETEM_REORDER={0xc}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_LOSS={0x1c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0xfddd}]}, @TCA_NETEM_SLOT={0x2c}]}}}]}, 0xac}}, 0x0) 19:53:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}]}, 0x70}}, 0x0) [ 219.689800][T10233] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 19:53:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5425, 0x0) 19:53:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b709000003000000bfa30000000000001503000000feffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b709000003000000bfa30000000000001503000000feffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5425, 0x0) [ 219.738816][T10238] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 19:53:00 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000400)=@newqdisc={0xac, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x7c, 0x2, {{}, [@TCA_NETEM_REORDER={0xc}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_LOSS={0x1c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0xfddd}]}, @TCA_NETEM_SLOT={0x2c}]}}}]}, 0xac}}, 0x0) 19:53:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b709000003000000bfa30000000000001503000000feffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf634b9eaafdc0a00001407711cc8fb58ad97c9112b000000002000009c3f2643ffff1607df99f0b660c3c5a5f05725caf1cae63487d30c028dcde5c0198e479603005ec6ed13623c09b244a48f35947e9d731f960dbaa8d987f9ac7fb9935677886aca069e05da754196c285f21a56aabba3c1de69ef51a30a802cdcbabdaf3ab04fd7f4526c84e309b60fc476bef6bf907aab3fcc9f0ebdd6afbfe262f8f0442c0a50077b02e0c6b09047f236b87ac8b9922d838d06d2c72d1ef6c6c23947fb0253f411f8a41db25ba58bdcf19f54c4019765c6cdf1001c698fd8275460664be0d029fd5a9904d639b8403c7bb84ce3ccfd18089fe54569c952cae9df5f9e4ba8fc7a31dd0c6599262f92c84078dae931c32cd4ea04504433ed738e42aae28f1984e483871c0f514e6430bfb91939aae9149c0faa165d1476e47cc578d9c7c1f2aa2a84c647ec7dcadf6deeeb81ea86f1f2138da487c9d0e621c9fc0cbda5cd1ec95a6395fa6988bbb98b501cd8e70120472a37e639aebcfad5309f669c"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 4: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 0: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) [ 219.815601][T10253] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 19:53:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b709000003000000bfa30000000000001503000000feffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b709000003000000bfa30000000000001503000000feffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf634b9eaafdc0a00001407711cc8fb58ad97c9112b000000002000009c3f2643ffff1607df99f0b660c3c5a5f05725caf1cae63487d30c028dcde5c0198e479603005ec6ed13623c09b244a48f35947e9d731f960dbaa8d987f9ac7fb9935677886aca069e05da754196c285f21a56aabba3c1de69ef51a30a802cdcbabdaf3ab04fd7f4526c84e309b60fc476bef6bf907aab3fcc9f0ebdd6afbfe262f8f0442c0a50077b02e0c6b09047f236b87ac8b9922d838d06d2c72d1ef6c6c23947fb0253f411f8a41db25ba58bdcf19f54c4019765c6cdf1001c698fd8275460664be0d029fd5a9904d639b8403c7bb84ce3ccfd18089fe54569c952cae9df5f9e4ba8fc7a31dd0c6599262f92c84078dae931c32cd4ea04504433ed738e42aae28f1984e483871c0f514e6430bfb91939aae9149c0faa165d1476e47cc578d9c7c1f2aa2a84c647ec7dcadf6deeeb81ea86f1f2138da487c9d0e621c9fc0cbda5cd1ec95a6395fa6988bbb98b501cd8e70120472a37e639aebcfad5309f669c"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b709000003000000bfa30000000000001503000000feffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x20b, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 19:53:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 4: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 0: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 2: syz_emit_ethernet(0xfe, &(0x7f00000001c0)={@multicast, @remote, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @rand_addr, {[@noop]}}, {0x16, 0x0, 0x0, @dev, "7a97c318d9ab62bf2bbdaccaf4737ea76fedd8c4fcf438f0141440a80351466d0d111209edd7d2c1a50131cd9889d7b9167c73c3009e359416286485952c629dc9ecba2d3293d017e672e2942913ef943e3c2aa3919d6ba16e3f354cb29f7215f0f413e7670dbbec5f0cb728f0de139eaade8f2520c596b7e6ae626001815b6398a09593557af155ff684207ac9d099884962f7506c3136a95bd49dc311c62c2dfbcc45942588252dc2cb59800393bb34bf7c38a28f132dc255964d6f21dca83f0a242ca696b3fe37d1a2bb93bdfc89a"}}}}}, 0x0) 19:53:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 5: unshare(0x40400) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:53:00 executing program 5: unshare(0x40400) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:53:00 executing program 4: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3ae, 0x7f, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 19:53:00 executing program 2: syz_emit_ethernet(0xfe, &(0x7f00000001c0)={@multicast, @remote, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @rand_addr, {[@noop]}}, {0x16, 0x0, 0x0, @dev, "7a97c318d9ab62bf2bbdaccaf4737ea76fedd8c4fcf438f0141440a80351466d0d111209edd7d2c1a50131cd9889d7b9167c73c3009e359416286485952c629dc9ecba2d3293d017e672e2942913ef943e3c2aa3919d6ba16e3f354cb29f7215f0f413e7670dbbec5f0cb728f0de139eaade8f2520c596b7e6ae626001815b6398a09593557af155ff684207ac9d099884962f7506c3136a95bd49dc311c62c2dfbcc45942588252dc2cb59800393bb34bf7c38a28f132dc255964d6f21dca83f0a242ca696b3fe37d1a2bb93bdfc89a"}}}}}, 0x0) 19:53:00 executing program 0: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)=""/219, 0xfffffffffffffed5}], 0x2) io_uring_enter(r0, 0x1d32, 0x0, 0x0, &(0x7f0000000000)={[0x100a]}, 0x8) 19:53:00 executing program 2: syz_emit_ethernet(0xfe, &(0x7f00000001c0)={@multicast, @remote, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @rand_addr, {[@noop]}}, {0x16, 0x0, 0x0, @dev, "7a97c318d9ab62bf2bbdaccaf4737ea76fedd8c4fcf438f0141440a80351466d0d111209edd7d2c1a50131cd9889d7b9167c73c3009e359416286485952c629dc9ecba2d3293d017e672e2942913ef943e3c2aa3919d6ba16e3f354cb29f7215f0f413e7670dbbec5f0cb728f0de139eaade8f2520c596b7e6ae626001815b6398a09593557af155ff684207ac9d099884962f7506c3136a95bd49dc311c62c2dfbcc45942588252dc2cb59800393bb34bf7c38a28f132dc255964d6f21dca83f0a242ca696b3fe37d1a2bb93bdfc89a"}}}}}, 0x0) 19:53:00 executing program 5: unshare(0x40400) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 2: syz_emit_ethernet(0xfe, &(0x7f00000001c0)={@multicast, @remote, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @rand_addr, {[@noop]}}, {0x16, 0x0, 0x0, @dev, "7a97c318d9ab62bf2bbdaccaf4737ea76fedd8c4fcf438f0141440a80351466d0d111209edd7d2c1a50131cd9889d7b9167c73c3009e359416286485952c629dc9ecba2d3293d017e672e2942913ef943e3c2aa3919d6ba16e3f354cb29f7215f0f413e7670dbbec5f0cb728f0de139eaade8f2520c596b7e6ae626001815b6398a09593557af155ff684207ac9d099884962f7506c3136a95bd49dc311c62c2dfbcc45942588252dc2cb59800393bb34bf7c38a28f132dc255964d6f21dca83f0a242ca696b3fe37d1a2bb93bdfc89a"}}}}}, 0x0) 19:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 5: unshare(0x40400) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:53:00 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:01 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:01 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:01 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:01 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) write$P9_RVERSION(r3, 0x0, 0x15) 19:53:02 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:53:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9f3f0433d00000000000000010010609030040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, "add44692c28032b614b925052c10bb84f02a7f"}) 19:53:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200004c, &(0x7f0000000000)={[{@stripe={'stripe', 0x3d, 0x13efd}}, {@nodiscard}]}, 0x6, 0x4dd, &(0x7f0000000140)="$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") 19:53:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6609, 0x0) 19:53:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6609, 0x0) [ 222.631670][T10426] loop2: detected capacity change from 0 to 512 19:53:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6609, 0x0) [ 222.674217][T10426] ======================================================= [ 222.674217][T10426] WARNING: The mand mount option has been deprecated and [ 222.674217][T10426] and is ignored by this kernel. Remove the mand [ 222.674217][T10426] option from the mount to silence this warning. [ 222.674217][T10426] ======================================================= 19:53:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000380)="580000001400add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e80900bbc9a54c0203a10000ff0014f03ac7100003ffffffffba6430d87abe5b08bd0e03080a5ec0", 0x58}], 0x1) 19:53:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000380)="580000001400add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e80900bbc9a54c0203a10000ff0014f03ac7100003ffffffffba6430d87abe5b08bd0e03080a5ec0", 0x58}], 0x1) 19:53:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6609, 0x0) 19:53:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000380)="580000001400add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e80900bbc9a54c0203a10000ff0014f03ac7100003ffffffffba6430d87abe5b08bd0e03080a5ec0", 0x58}], 0x1) [ 222.799297][T10426] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 222.852470][T10426] EXT4-fs error (device loop2): ext4_orphan_get:1392: inode #17: comm syz-executor.2: casefold flag without casefold feature [ 222.890579][T10426] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 69 vs 41 free clusters [ 222.905475][T10426] Quota error (device loop2): write_blk: dquota write failed [ 222.913835][T10426] Quota error (device loop2): qtree_write_dquot: Error -28 occurred while creating quota [ 222.927793][T10426] EXT4-fs (loop2): 1 truncate cleaned up [ 222.933861][T10426] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 222.952092][T10426] syz-executor.2 (10426) used greatest stack depth: 9704 bytes left [ 222.962305][ T3148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200004c, &(0x7f0000000000)={[{@stripe={'stripe', 0x3d, 0x13efd}}, {@nodiscard}]}, 0x6, 0x4dd, &(0x7f0000000140)="$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") 19:53:03 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000), 0x14) 19:53:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000380)="580000001400add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e80900bbc9a54c0203a10000ff0014f03ac7100003ffffffffba6430d87abe5b08bd0e03080a5ec0", 0x58}], 0x1) 19:53:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:03 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 19:53:03 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000010000000068000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000626f6e645f736c6176655f3000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b8080000e8080000616d6f6e670000000000000000000000001b00000000000000000400000000001804000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00000000fa0100000000000000000000000000000000000000000000000000000000004037118bc35d3037960000000000000000000000000000000000000000000000000000000000001f0000000000000000000000938d5e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4f500000000000000000300020000000000000000006c00000000000000000000000000000000000000000000000000000000000000000000000000892f9284b45f00000000000000000000000000000000a600000000000000000000000000f9ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000080000001567cc0fb18ebd10677f000000000000000000000000b038562daba737bd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070cc490d0510d30ce90b91aedadb0c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ed2c14bc1d077b4817d693d02c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037ff1cf2f8e52e074300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d659920000000000e5c7ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cbcb951a4f0f3300ebb39c00000000000000000000000000000000000000000000000000000000000000000000000000e70000000000053cbf7eee533b170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffff8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002292091a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c1a8a95ba6a3ba677371c303b5426300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c81e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000020000000000000000000000052000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003800e04771f4c2d1000000000000000000000000000000000000000000000000000000000000000000726564697265637400"/2376]}, 0x9c0) [ 223.478430][T10460] Unsupported ieee802154 address type: 0 [ 223.480157][ T23] audit: type=1400 audit(1678391583.901:221): avc: denied { bind } for pid=10455 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 223.489022][T10462] loop2: detected capacity change from 0 to 512 19:53:03 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000), 0x14) [ 223.532771][T10462] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 223.542706][ T23] audit: type=1326 audit(1678391583.931:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 [ 223.567819][ T23] audit: type=1326 audit(1678391583.941:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=22 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 [ 223.568257][T10469] Unsupported ieee802154 address type: 0 [ 223.593887][ T23] audit: type=1326 audit(1678391583.941:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 19:53:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:03 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 19:53:04 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 19:53:04 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) [ 223.593911][ T23] audit: type=1326 audit(1678391583.941:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 [ 223.650697][ T23] audit: type=1326 audit(1678391583.941:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 [ 223.675904][ T23] audit: type=1326 audit(1678391583.941:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 [ 223.702886][ T23] audit: type=1326 audit(1678391583.941:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10457 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fb0480f9 code=0x7ffc0000 [ 223.736770][T10462] EXT4-fs error (device loop2): ext4_orphan_get:1392: inode #17: comm syz-executor.2: casefold flag without casefold feature [ 223.758747][T10462] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 69 vs 41 free clusters [ 223.775484][T10462] EXT4-fs (loop2): 1 truncate cleaned up 19:53:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200004c, &(0x7f0000000000)={[{@stripe={'stripe', 0x3d, 0x13efd}}, {@nodiscard}]}, 0x6, 0x4dd, &(0x7f0000000140)="$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") 19:53:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:04 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 19:53:04 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000), 0x14) [ 223.781184][T10462] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 223.803858][ T3148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 223.812423][T10487] Unsupported ieee802154 address type: 0 [ 223.852824][T10490] loop2: detected capacity change from 0 to 512 [ 223.860556][T10490] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 223.878902][T10490] EXT4-fs error (device loop2): ext4_orphan_get:1392: inode #17: comm syz-executor.2: casefold flag without casefold feature [ 223.893257][T10490] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 69 vs 41 free clusters [ 223.909176][T10490] EXT4-fs (loop2): 1 truncate cleaned up [ 223.915248][T10490] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 223.937559][ T3148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:04 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 19:53:04 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 19:53:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:04 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000), 0x14) 19:53:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200004c, &(0x7f0000000000)={[{@stripe={'stripe', 0x3d, 0x13efd}}, {@nodiscard}]}, 0x6, 0x4dd, &(0x7f0000000140)="$eJzs3U1vW1kZAOD3OnEnmQacGVgMIzFTZopSBLWTph8Ri9JKCFaVEGWfhsSJojhxFDttE1WQ/gIQqgCJFSs2SPwAJNSfgJAqwZ4VqIKULtggo2tf98OxQwJuTJ3nkW7vuefUft/jxNfn3HsUB3BqnYuIGxExEhFfiYhCVp/Ltthrben/e7b/YDHdkmg0bv8tiSSr63zOs9nDxiLiu9+O+H5yMG5tZ3dtoVIpb2XHpfr6Zqm2s3txdX1hpbxS3pidnbk6d23uytz0EXuSjB7W+l5EXP/m85/+6Fffuv67r9378/xfL/wgTWsia+/Wj35odT3ffC1azryJMAOT/t6MNnsIAMDbIB3jvx8RnzTH/4UYiUOH0QAAAMBbqPGNiXfaRQAAAGA45ZprYJNcMVsLMBG5XLHYWsP7+Xg3V6nW6l9drm5vLLXWyk5GPre8WilPZ2uFJyOfpMczzfLL40sdx7PZGtxHhfH0uNkGAAAAnIyzHfP/54XW/B8AAAAYMm7GAwAAwPAz/wcAAIDhZ/4PAAAAQ+07t26lW+PZ/oPm9wAs3d3ZXqvevbhUrq0V17cXi4vVrc3iSrW6UikXR/7z81Wq1c3LsbF9v1Qv1+ql2s7u/Hp1e6M+3/xe7/ny+yfQJwAAAOB17338+E9JROx9fby5pc5kbfmBZgb8H0lGOyrufGlAmQB9cYRL+q87t/1mEgFOXOdnOnB6mOMDSWdFx8BgrNdQ4ffHj2XMAQAAgzH1Bff/4bTKDToBYGB+POgEgIFxLR5Or/zxVwACQ+bA/f8OY70ajnz/v9E4VkIAAEDfTbR2e5HdC5yIXK5YfHFbMFlerZSnI+KzEfHHQv6d9HhmgPkCAAAAAAAAAAAAAAAAAAAAAAAAwNuo0UiiAQAAAAy1iNxfkuz7v6YK5yc6rw+cSf5ZaO4j4t4vbv/s/kK9vjWT1v/9RX3951n9pUFcwQAAAIDTKH9oa3ue3p7HAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEA/Pdt/sNjeTjLu05sxHpPd4o/GWHM/FvmIePcfSYy+8rgkIkb6EH/vYUR80C1+kqYVk1kWnfFzETE+4Phn+xAfTrPHNyPiRrf3Xy7ONffd33+j2fa/enqz+SbvGr99/hvpcf77zBFjfPjkN6We8R9GfDja/fzTjp/0iP/pEePf+d7ubq+2xi8jprp+/iSvxSrV1zdLtZ3di6vrCyvllfLG7OzM1blrc1fmpkvLq5Vy9m/XGD/54m/3HvXsf665fzV+u5+TrQx/2Kv/54/Y/389ub//uVYxfzB+xIVPu//8P2juu7/+6e/El7PPgbR9ql3ea5Vf9dGv//BRr9zS+Es9Xv/Wz7/Q6NX/C0fr/oE+AwCDVdvZXVuoVMpbJ1D45HL/njA5oZwVFIa5kM4ZujcN+swEAAD028tB/6AzAQAAAAAAAAAAAAAAAAAAgNPrv/rjYR8f71GdMfcG01UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgEP9OwAA//8jRs4f") 19:53:04 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() [ 224.325910][T10499] Unsupported ieee802154 address type: 0 [ 224.334387][T10500] loop2: detected capacity change from 0 to 512 19:53:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() [ 224.383840][T10500] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 224.437106][T10500] EXT4-fs error (device loop2): ext4_orphan_get:1392: inode #17: comm syz-executor.2: casefold flag without casefold feature [ 224.459291][T10500] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 69 vs 41 free clusters [ 224.474426][T10500] EXT4-fs (loop2): 1 truncate cleaned up [ 224.480846][T10500] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 224.505012][ T3148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:05 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:05 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:05 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, &(0x7f0000000080)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "89a0eef5affb517c35e3e1be43d854ab3d3be965285b6cb3bb07a9a9bf6b9b7144d79c5168a1e455c4c7b365e59c9c833d81121589d0a3527d106222df224d05", "1fdcdfda2cddb29ebe52c64b0498423275fe748a8d096b11d47bc0d7e46bb91c60e03471c993e731c139441bf69ff65747e4776c587074df3007cb3d56b16342", "a81c1daf21e14e7516100a03d81cde71115a2870289cab1ea822c74aac8b1561"}}) 19:53:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigreturn() 19:53:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, &(0x7f0000000080)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "89a0eef5affb517c35e3e1be43d854ab3d3be965285b6cb3bb07a9a9bf6b9b7144d79c5168a1e455c4c7b365e59c9c833d81121589d0a3527d106222df224d05", "1fdcdfda2cddb29ebe52c64b0498423275fe748a8d096b11d47bc0d7e46bb91c60e03471c993e731c139441bf69ff65747e4776c587074df3007cb3d56b16342", "a81c1daf21e14e7516100a03d81cde71115a2870289cab1ea822c74aac8b1561"}}) [ 225.303496][T10540] loop1: detected capacity change from 0 to 2048 19:53:06 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:06 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:06 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, &(0x7f0000000080)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "89a0eef5affb517c35e3e1be43d854ab3d3be965285b6cb3bb07a9a9bf6b9b7144d79c5168a1e455c4c7b365e59c9c833d81121589d0a3527d106222df224d05", "1fdcdfda2cddb29ebe52c64b0498423275fe748a8d096b11d47bc0d7e46bb91c60e03471c993e731c139441bf69ff65747e4776c587074df3007cb3d56b16342", "a81c1daf21e14e7516100a03d81cde71115a2870289cab1ea822c74aac8b1561"}}) 19:53:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) preadv(r0, &(0x7f0000003800)=[{&(0x7f00000024c0)=""/4094, 0xffe}], 0x1, 0x0, 0x0) 19:53:06 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, &(0x7f0000000080)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "89a0eef5affb517c35e3e1be43d854ab3d3be965285b6cb3bb07a9a9bf6b9b7144d79c5168a1e455c4c7b365e59c9c833d81121589d0a3527d106222df224d05", "1fdcdfda2cddb29ebe52c64b0498423275fe748a8d096b11d47bc0d7e46bb91c60e03471c993e731c139441bf69ff65747e4776c587074df3007cb3d56b16342", "a81c1daf21e14e7516100a03d81cde71115a2870289cab1ea822c74aac8b1561"}}) 19:53:06 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:06 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) [ 226.086092][T10553] loop1: detected capacity change from 0 to 2048 19:53:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:06 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) [ 226.174039][T10569] loop1: detected capacity change from 0 to 2048 [ 226.175075][ T9632] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 226.241784][T10576] loop1: detected capacity change from 0 to 2048 19:53:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000013000000350000000000bb00850000000500000095000020000000004cf12aa5cbd56806f81f06a9c7fff5e0a141d524588f32cb417f90ee60b191e2c825cd4d581c45469816b05b61a3cf5fc6dd8442230e7953f911aa1f7035175135230163cf09493497cbe593f90a84f687a1ef1f83dd6c1023678a1086f7d0f9dce435558fe138d7362090db7457c14bc34e6bdea4217c4b49377faf0887c697add9a7ab69000000004f0a9c13ecee61c09a701bd5192a9e19b27de967bfb3fe241454a040809f648ce02171233888f07f5ab2667027d4b33729d714e0e205db36aa525043392b9921e113e3a833c63d335d96f514000000000000a931b3a7d84136ee2c89a1208957c8b34c68fd4c3066629eaa821d055f2af7021c5a08cd9d2e0495ea96851689f1d9a600764027c2a6514b3f4e8c48a02ef50340d1f918f40410bbe37abb9a6880e80e08d6755a2adc48eb46a73d7b37f5ab0e7448a81d5ca53444d85c567a0227cdd7156915b9a88d3e8ab605858f29a1"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000013000000350000000000bb00850000000500000095000020000000004cf12aa5cbd56806f81f06a9c7fff5e0a141d524588f32cb417f90ee60b191e2c825cd4d581c45469816b05b61a3cf5fc6dd8442230e7953f911aa1f7035175135230163cf09493497cbe593f90a84f687a1ef1f83dd6c1023678a1086f7d0f9dce435558fe138d7362090db7457c14bc34e6bdea4217c4b49377faf0887c697add9a7ab69000000004f0a9c13ecee61c09a701bd5192a9e19b27de967bfb3fe241454a040809f648ce02171233888f07f5ab2667027d4b33729d714e0e205db36aa525043392b9921e113e3a833c63d335d96f514000000000000a931b3a7d84136ee2c89a1208957c8b34c68fd4c3066629eaa821d055f2af7021c5a08cd9d2e0495ea96851689f1d9a600764027c2a6514b3f4e8c48a02ef50340d1f918f40410bbe37abb9a6880e80e08d6755a2adc48eb46a73d7b37f5ab0e7448a81d5ca53444d85c567a0227cdd7156915b9a88d3e8ab605858f29a1"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000013000000350000000000bb00850000000500000095000020000000004cf12aa5cbd56806f81f06a9c7fff5e0a141d524588f32cb417f90ee60b191e2c825cd4d581c45469816b05b61a3cf5fc6dd8442230e7953f911aa1f7035175135230163cf09493497cbe593f90a84f687a1ef1f83dd6c1023678a1086f7d0f9dce435558fe138d7362090db7457c14bc34e6bdea4217c4b49377faf0887c697add9a7ab69000000004f0a9c13ecee61c09a701bd5192a9e19b27de967bfb3fe241454a040809f648ce02171233888f07f5ab2667027d4b33729d714e0e205db36aa525043392b9921e113e3a833c63d335d96f514000000000000a931b3a7d84136ee2c89a1208957c8b34c68fd4c3066629eaa821d055f2af7021c5a08cd9d2e0495ea96851689f1d9a600764027c2a6514b3f4e8c48a02ef50340d1f918f40410bbe37abb9a6880e80e08d6755a2adc48eb46a73d7b37f5ab0e7448a81d5ca53444d85c567a0227cdd7156915b9a88d3e8ab605858f29a1"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000013000000350000000000bb00850000000500000095000020000000004cf12aa5cbd56806f81f06a9c7fff5e0a141d524588f32cb417f90ee60b191e2c825cd4d581c45469816b05b61a3cf5fc6dd8442230e7953f911aa1f7035175135230163cf09493497cbe593f90a84f687a1ef1f83dd6c1023678a1086f7d0f9dce435558fe138d7362090db7457c14bc34e6bdea4217c4b49377faf0887c697add9a7ab69000000004f0a9c13ecee61c09a701bd5192a9e19b27de967bfb3fe241454a040809f648ce02171233888f07f5ab2667027d4b33729d714e0e205db36aa525043392b9921e113e3a833c63d335d96f514000000000000a931b3a7d84136ee2c89a1208957c8b34c68fd4c3066629eaa821d055f2af7021c5a08cd9d2e0495ea96851689f1d9a600764027c2a6514b3f4e8c48a02ef50340d1f918f40410bbe37abb9a6880e80e08d6755a2adc48eb46a73d7b37f5ab0e7448a81d5ca53444d85c567a0227cdd7156915b9a88d3e8ab605858f29a1"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000013000000350000000000bb00850000000500000095000020000000004cf12aa5cbd56806f81f06a9c7fff5e0a141d524588f32cb417f90ee60b191e2c825cd4d581c45469816b05b61a3cf5fc6dd8442230e7953f911aa1f7035175135230163cf09493497cbe593f90a84f687a1ef1f83dd6c1023678a1086f7d0f9dce435558fe138d7362090db7457c14bc34e6bdea4217c4b49377faf0887c697add9a7ab69000000004f0a9c13ecee61c09a701bd5192a9e19b27de967bfb3fe241454a040809f648ce02171233888f07f5ab2667027d4b33729d714e0e205db36aa525043392b9921e113e3a833c63d335d96f514000000000000a931b3a7d84136ee2c89a1208957c8b34c68fd4c3066629eaa821d055f2af7021c5a08cd9d2e0495ea96851689f1d9a600764027c2a6514b3f4e8c48a02ef50340d1f918f40410bbe37abb9a6880e80e08d6755a2adc48eb46a73d7b37f5ab0e7448a81d5ca53444d85c567a0227cdd7156915b9a88d3e8ab605858f29a1"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:08 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:08 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x9e916ac9446c2bfe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x5, 0xbf, 0x100, 0x7, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x9, &(0x7f0000000200)=@raw=[@map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @btf_id={0x18, 0x9}, @func, @map_idx={0x18, 0x7}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}], &(0x7f0000000100)='GPL\x00', 0x5, 0x74, &(0x7f0000000280)=""/116, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x10, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r0, r0, r0]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4a5, 0x0, 0x20}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x20) 19:53:08 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:08 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:10 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:11 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:11 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:11 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:11 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:11 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:11 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) [ 231.328382][T10707] loop5: detected capacity change from 0 to 2048 19:53:11 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:11 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) [ 231.383944][T10715] loop5: detected capacity change from 0 to 2048 [ 231.418105][T10721] loop5: detected capacity change from 0 to 2048 19:53:11 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) 19:53:11 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(&(0x7f0000002b40)='.\x00', &(0x7f0000002b80)) [ 231.458648][T10725] loop5: detected capacity change from 0 to 2048 [ 231.489519][T10728] loop5: detected capacity change from 0 to 2048 19:53:11 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) [ 231.518506][T10730] loop5: detected capacity change from 0 to 2048 19:53:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:12 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:12 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:12 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:12 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x1}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x0, &(0x7f0000000600)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r7 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x24004841}, 0x404c881) r8 = fcntl$dupfd(r7, 0x406, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000100)={@loopback}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES8=r7, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES16=r4, @ANYRESOCT=r4, @ANYRES8=r4, @ANYRESOCT=r9, @ANYRES32=r8, @ANYRES8=r7], 0x40}}, 0x24040891) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={r9, 0x0, 0x20, 0x8f9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e21, 0x40, @mcast2, 0xfff}}, 0x0, 0xfffe}, 0x90) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r10 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:12 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 3: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 3: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 1: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 1: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 0: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 3: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 0: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 1: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 3: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:13 executing program 0: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 3: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) 19:53:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) [ 233.292315][ T23] kauditd_printk_skb: 218 callbacks suppressed [ 233.292327][ T23] audit: type=1400 audit(1678391593.711:441): avc: denied { bind } for pid=10839 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 233.294458][T10842] loop5: detected capacity change from 0 to 512 19:53:13 executing program 3: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) llistxattr(&(0x7f000000a000)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000080)=@generic={0x0, "50729f1be70977e05e86063e4abe92b4620ed59e624e86195ab8f4e6f19572968a452d8e6e5073e8860800000066ab687a86462e7c60d27506ad6431fc215d2fd447da2096a5b0060c6343ff18c499a67189f8bbd1bba64d2a179719f2d73f6722229178c7808dfd5723f9650000000200"}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x4, 0x1, 0x75, 0xfff}, {0x401, 0x7f, 0x81, 0x6}, {0x2, 0x0, 0x6f, 0x7}, {0x3, 0xff, 0x40, 0x9}, {0x6b7, 0x3, 0x0, 0x7}, {0xbe2, 0x1, 0x4}, {0x3, 0x6, 0x3f}, {0x101, 0x6, 0x3, 0x100}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$poke(0x5, r2, &(0x7f0000000000), 0x0) tkill(r2, 0x27) 19:53:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) [ 233.311653][ T23] audit: type=1400 audit(1678391593.721:442): avc: denied { write } for pid=10844 comm="syz-executor.2" name="001" dev="devtmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 233.359166][T10845] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 233.395765][ T23] audit: type=1400 audit(1678391593.811:443): avc: denied { create } for pid=10821 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 233.416438][ T23] audit: type=1400 audit(1678391593.811:444): avc: denied { ioctl } for pid=10821 comm="syz-executor.1" path="socket:[32752]" dev="sockfs" ino=32752 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 233.462172][T10842] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 233.478474][T10842] ext4 filesystem being mounted at /root/syzkaller-testdir68335622/syzkaller.hXwZHH/337/file0 supports timestamps until 2038 (0x7fffffff) [ 233.496122][T10842] EXT4-fs error (device loop5): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.5: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 [ 233.518972][ T23] audit: type=1400 audit(1678391593.941:445): avc: denied { create } for pid=10838 comm="syz-executor.5" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 233.547263][ T3160] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:14 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) 19:53:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) 19:53:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:14 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) [ 233.630738][T10863] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 233.641908][T10864] loop5: detected capacity change from 0 to 512 [ 233.655153][T10865] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. 19:53:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) 19:53:14 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) 19:53:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 233.678782][T10873] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 233.700900][T10878] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 233.738555][T10864] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 233.756625][T10883] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 233.774195][T10864] ext4 filesystem being mounted at /root/syzkaller-testdir68335622/syzkaller.hXwZHH/338/file0 supports timestamps until 2038 (0x7fffffff) [ 233.837147][T10864] EXT4-fs error (device loop5): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.5: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 [ 233.869944][ T3160] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:14 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303047a03000500000002000020d3"]) 19:53:14 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fbf52004507000002000000250600000ee60000bf250000000000002d630000000000006507040002000000070700004c0000001f75000000000000bf540000000000000704000004000bffbd350100000000009500000000000000050000000000000095000000000000001f1bd1fe4b3af9c97925711095cc1a3a25b9418ffdc4a1da470a14e4391c3fb600100000a4911fe82664d775cdb9dfc83fa32db39b636c1866b526ffff00005172a74e9afe751664f580a6c5bccf1ef6583e0c1cd1f7fe416b5d6902e7db826e6dffda3aabdc5b5ce08ca4ee6035f1b7dc6b3b4672f7c22efa6d633473cd548789f8ab5a654106888aff6f3eb7e962160dac2c68c044584bb50e9c0952bab14c2c65176c7e40faaea21457d5f2d6f40c4d3390a1e14561cbf0a6ccd15f45c52753e24c6488b23ec9a3261c7706cecfc37b25b382c76671983e053efde84f80c5483d26bfaa83bf477cca77d399c76469551913f98a26fa0363ebb7f861a3d53d4dd6d91f7dcefb0748cd20346878bc0759851cd32ba781d6e62e8eee022be7fb6fff27871a5a7a723e5e330f454f0c568fbfc9b901bd6cc3af8355e5ecf3f74a472c7861beeeba7d5d25208a2e1d4c0b8e4f82ce05ffe1c69aaea312bbb3656c873b26161dccd130823e87d0b411e6fdb2cc4def13ecdf4217c09e803c9dbaba0cd1036081842b7fc3a30759c24058ad22001bc2817d4604bc2d49bf41894e61356ddf6d394a397c55321a0dd4ac4082ee583de98e8a89535050054d40a4dbd809d0ce9c44c286b5d5a51d933d35714d8ca7fb49b5329107825926fd5caaf4ddd1e81e616fc56e47530e51cd558d630f665a88da23e96c45a0a4ccd554a92628336eb43de1022d60e5ffe41b6bef61ea28c5ea09a832f9f84b10aa4b6350930b11865184fce06bb8bf7d3440526aa2055daa7945db10e7c2cf517d954fc2db6cdee34cff68b43fef6205f2cf390e1bc4ee8ee0b5f204bf"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:14 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 233.998365][T10891] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 234.007709][T10893] loop5: detected capacity change from 0 to 512 [ 234.063003][T10893] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 234.113357][T10893] ext4 filesystem being mounted at /root/syzkaller-testdir68335622/syzkaller.hXwZHH/339/file0 supports timestamps until 2038 (0x7fffffff) 19:53:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) [ 234.171515][T10893] EXT4-fs error (device loop5): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.5: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 19:53:14 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 234.231116][ T3160] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 234.278274][T10906] loop5: detected capacity change from 0 to 512 [ 234.309395][T10906] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 234.327516][T10906] ext4 filesystem being mounted at /root/syzkaller-testdir68335622/syzkaller.hXwZHH/340/file0 supports timestamps until 2038 (0x7fffffff) 19:53:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 234.371454][T10906] EXT4-fs error (device loop5): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.5: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 19:53:14 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 234.443720][ T3160] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$eJzs3c9vHFcdAPDvjNc/mrp1Aj1ABSRAIaAou/Gmjape2lxAqKqEqDggDqmxN5bJbjZk16U2kXDv3EACiRP8CUggcUDqiQM3jkgcEFI5IAWIQAkSSItmduxuk3W8ifdH2P18pNHMmzcz3/e8nnkzb+15AcysMxGxFxELEfFWRKwU65Niite6U7bd3Tu31u/dubWeRKfz5t+TPD9bFz37ZJ4ujrkUEV/7csS3kgfjtnZ2r63V67WbRbrSbtyotHZ2z2811jZrm7Xr1eql1UsXXr74UnVodT3d+MXtL229/vXf/PqT7/9+74vfy4q1XOT11mOYulWfP4iTKUXE66MINgFzxXxhwuXg8aQR8ZGI+Ex+/q/EXP7bCQBMs05nJTorvWkAYNqleR9YkpaLvoDlSNNyuduH91ycSOvNVvvc1eb29Y1uX1kp5tOrW/XahVOLf/xOfscwn2Tp1Yg4mU/ddPW+9MWIOBURP1p8Kk+X15v1jcnd9gDATHv6vvb/X4vd9n8Afb7VAwD+byz1LKcTLAcAMD5LR23gUR8Aps6R7T8AMHUGaP+LHoC9kZcFABgPz/8AMHu0/wAwe7T/ADBTvvrGG9nUuVe8/3rj7Z3ta823z2/UWtfKje318nrz5o3yZrO5mb+zp3HU8erN5o3VF2P7nUq71mpXWju7VxrN7evtK/l7va/U5sdSKwDgYU6dfu8PSUTsvfJUPkXPWA7aaphuj/q6j18a6AWmxtykCwBMjNG+YHYN/oz/u5GWA5icvm/4Wuq7+GE/eYQg/s4InihnPz54/7+uP5guXvcNs+vx+v9fHXo5gPHT/w+zq9NJ7h/zf+EgCwCYSg/7/v+IvsHO94d5IwJMzFEjfPX/6n7/KjKSIgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMATbzkivh1JWi7G+1mONC2XI56JiJMxn1zdqtcuRMSzcToi5hez9OqkCw0AHFP616QY/+vsygvL9+cuJP9ezOcR8d2fvvnjd9ba7Zur2fp/HKxf3B8+rPrBfg8bVxAAGK+8/a4W854H+bt3bq3vT+Msz+3L8d9iENH1e3du5VM3pxSlfL6U30uc+GdSpLtjkT4fEXNDiL/3bkR8rF/9k7xv5GQx8mlv/ChiPzPW+OmH4qd5Xnee3Xx9dAhlgVnz3uWIeK3f+ZfGmXze//zP1pZ2fnDs+Lcvdw+2f+271xN///o31yd+ds6fGTTGi7/9ygMrOyvdvHcjni/1i58cxE8Oif/CgPH/9IlP/fDVQ/I6P4s4G/3j98aqtBs3Kq2d3fNbjbXN2mbterV6afXShZcvvlSt5H3Ulf2e6gf97ZVzzx5Wtqz+Jw6Jv9S3/gsH+35uwPr//D9vffPTD4n/hc/2//yf6xu/K2sTPz9g/LUTv+o/fHcRf+OQ+h/1+Z8bMP77f9ndGHBTAGAMWju719bq9drNYy1kT6HDOM4DC1kRj3WcpBTxCHv9+VE2HvXC/Kh+qiNfKB3cKw73yN/Ijjjm6qRDr8WxFu6OK9Zkr0vA6H1w0vd0uAAAAAAAAAAAAAAAAE+Ucfzr0qTrCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwPT6XwAAAP//Y+zT1A==") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) [ 235.229854][T10938] loop1: detected capacity change from 0 to 512 [ 235.270152][T10938] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 19:53:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fbf52004507000002000000250600000ee60000bf250000000000002d630000000000006507040002000000070700004c0000001f75000000000000bf540000000000000704000004000bffbd350100000000009500000000000000050000000000000095000000000000001f1bd1fe4b3af9c97925711095cc1a3a25b9418ffdc4a1da470a14e4391c3fb600100000a4911fe82664d775cdb9dfc83fa32db39b636c1866b526ffff00005172a74e9afe751664f580a6c5bccf1ef6583e0c1cd1f7fe416b5d6902e7db826e6dffda3aabdc5b5ce08ca4ee6035f1b7dc6b3b4672f7c22efa6d633473cd548789f8ab5a654106888aff6f3eb7e962160dac2c68c044584bb50e9c0952bab14c2c65176c7e40faaea21457d5f2d6f40c4d3390a1e14561cbf0a6ccd15f45c52753e24c6488b23ec9a3261c7706cecfc37b25b382c76671983e053efde84f80c5483d26bfaa83bf477cca77d399c76469551913f98a26fa0363ebb7f861a3d53d4dd6d91f7dcefb0748cd20346878bc0759851cd32ba781d6e62e8eee022be7fb6fff27871a5a7a723e5e330f454f0c568fbfc9b901bd6cc3af8355e5ecf3f74a472c7861beeeba7d5d25208a2e1d4c0b8e4f82ce05ffe1c69aaea312bbb3656c873b26161dccd130823e87d0b411e6fdb2cc4def13ecdf4217c09e803c9dbaba0cd1036081842b7fc3a30759c24058ad22001bc2817d4604bc2d49bf41894e61356ddf6d394a397c55321a0dd4ac4082ee583de98e8a89535050054d40a4dbd809d0ce9c44c286b5d5a51d933d35714d8ca7fb49b5329107825926fd5caaf4ddd1e81e616fc56e47530e51cd558d630f665a88da23e96c45a0a4ccd554a92628336eb43de1022d60e5ffe41b6bef61ea28c5ea09a832f9f84b10aa4b6350930b11865184fce06bb8bf7d3440526aa2055daa7945db10e7c2cf517d954fc2db6cdee34cff68b43fef6205f2cf390e1bc4ee8ee0b5f204bf"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 19:53:15 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6(0xa, 0x3, 0x103) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r7], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 235.361142][T10943] loop4: detected capacity change from 0 to 512 [ 235.362936][T10938] ext4 filesystem being mounted at /root/syzkaller-testdir1028720096/syzkaller.qfEOhB/305/file0 supports timestamps until 2038 (0x7fffffff) [ 235.395364][T10943] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 19:53:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) [ 235.416996][T10943] ext4 filesystem being mounted at /root/syzkaller-testdir2005599022/syzkaller.1sxmhx/317/file0 supports timestamps until 2038 (0x7fffffff) 19:53:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) [ 235.493908][T10943] EXT4-fs error (device loop4): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.4: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 19:53:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) [ 235.525774][T10938] EXT4-fs error (device loop1): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.1: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 19:53:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) [ 235.589419][ T3138] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 235.603623][ T3143] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) [ 235.652531][T10962] loop4: detected capacity change from 0 to 512 [ 235.684018][T10963] loop1: detected capacity change from 0 to 512 [ 235.702978][T10962] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 235.716431][T10962] ext4 filesystem being mounted at /root/syzkaller-testdir2005599022/syzkaller.1sxmhx/318/file0 supports timestamps until 2038 (0x7fffffff) [ 235.724374][T10963] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 235.756708][T10963] ext4 filesystem being mounted at /root/syzkaller-testdir1028720096/syzkaller.qfEOhB/306/file0 supports timestamps until 2038 (0x7fffffff) [ 235.792996][T10963] EXT4-fs error (device loop1): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.1: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 [ 235.818152][T10962] EXT4-fs error (device loop4): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.4: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 [ 235.862347][ T3143] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 235.876227][ T3138] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17000000000000000006140000000800030000000008180001801400020073797a5f74756e"], 0x34}}, 0x0) 19:53:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000802, &(0x7f0000000080)=ANY=[], 0xff, 0x54d, &(0x7f0000000700)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 19:53:16 executing program 2: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x17) 19:53:16 executing program 5: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) 19:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x222, &(0x7f0000000300)="$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") 19:53:16 executing program 2: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x17) 19:53:16 executing program 5: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) 19:53:16 executing program 3: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) [ 236.055396][T10977] loop1: detected capacity change from 0 to 512 [ 236.066441][T10976] loop4: detected capacity change from 0 to 512 [ 236.094362][T10983] loop0: detected capacity change from 0 to 132 19:53:16 executing program 5: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) 19:53:16 executing program 3: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) 19:53:16 executing program 2: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x17) [ 236.102428][ T9632] udevd[9632]: inotify_add_watch(7, /dev/loop0p13, 10) failed: No such file or directory [ 236.119518][ T23] audit: type=1400 audit(1678391596.541:446): avc: denied { mount } for pid=10982 comm="syz-executor.0" name="/" dev="loop0" ino=1472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 236.157177][T10977] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 236.157413][T10976] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 236.172116][T10977] ext4 filesystem being mounted at /root/syzkaller-testdir1028720096/syzkaller.qfEOhB/307/file0 supports timestamps until 2038 (0x7fffffff) [ 236.199784][ T23] audit: type=1400 audit(1678391596.541:447): avc: denied { unmount } for pid=3129 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 236.224142][T10976] ext4 filesystem being mounted at /root/syzkaller-testdir2005599022/syzkaller.1sxmhx/319/file0 supports timestamps until 2038 (0x7fffffff) [ 236.249251][T10977] EXT4-fs error (device loop1): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.1: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 [ 236.282910][T10976] EXT4-fs error (device loop4): ext4_search_dir:1528: inode #2: block 3: comm syz-executor.4: bad entry in directory: rec_len is smaller than minimal - offset=16428, inode=12, rec_len=4, size=2048 fake=0 19:53:16 executing program 3: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) 19:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x222, &(0x7f0000000300)="$eJzs3NFL61YcB/DToVDcy0A2tb5kCsPJVpOIleJTqWmNS9vRVpiPAx2M+bQ9zX9+I2314tVr5aLWK58PtOc0+TY9hZAfOeU0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACh0j6O46QSirx/9lv0ae3j4aD3yP6b431/p3nkc0OolI9QrYb16ab11Q+7vy2ftsLa9NVaqJZNNVx//d03R6tLX928/5EBvYp//r3+6/erq8u/Fz2QBelm/Xw0yHutbhblo0HUbDTivZPOKOrkRTY6H42zXtQeZq3xYBjttH+MkmZzP8rq54Ozfve4VWQ3Gw9/TuO4EZ3Wf81aw9Ggv3daH7VP8qLI+91JptxdZg7LE/GXfByNs1Yviv748+pyf94gy1DylFA6L5TGaZokaZo0DpoHh3G8dG9D/JFwL7H4k5bFeuYrOHy+/2b1HwAAAHi/KpM59vL+f3kyD18JnbzI4kUPCwAAAHhGk1/+18pmueyth4r7fwAAAHhv5q+xm5uo/BQ2pomNi2l7MUvM1vmtdPIiq7cHxVESfrhd7ffw0ZYn0w+7oTZN1Vam7crdI1bLVFI/SsJu2JwmNne2y2Z754Fk+uTkfpkEgPdua049fkr93w2zNa1RrSymYan2QGWNVVYAeCtu/8HmBTuL/o4AwF2qNAAAAAAAAAAAAAAAvH2vsf5PR0fnS+ss+soEvLT/AwAA//9ytdHj") 19:53:16 executing program 5: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) 19:53:16 executing program 2: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x17) 19:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x222, &(0x7f0000000300)="$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") 19:53:16 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r1}}, 0x0) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 19:53:16 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) 19:53:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x6}, @IFLA_BOND_TLB_DYNAMIC_LB={0x5}]}}}]}, 0x44}, 0x1, 0x18a}, 0x0) 19:53:16 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) [ 236.314940][ T3143] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 236.337029][T11006] loop0: detected capacity change from 0 to 132 [ 236.346145][ T3138] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 19:53:16 executing program 4: setresuid(0x0, 0xee00, 0xffffffffffffffff) r0 = socket(0x1e, 0x4, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xca}, 0x4) 19:53:16 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) 19:53:16 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r1}}, 0x0) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) [ 236.390175][T11010] loop0: detected capacity change from 0 to 132 [ 236.396031][ T23] audit: type=1400 audit(1678391596.811:448): avc: denied { override_creds } for pid=11008 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 236.419088][T11012] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 19:53:16 executing program 4: setresuid(0x0, 0xee00, 0xffffffffffffffff) r0 = socket(0x1e, 0x4, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xca}, 0x4) 19:53:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x222, &(0x7f0000000300)="$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") 19:53:16 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) 19:53:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x6}, @IFLA_BOND_TLB_DYNAMIC_LB={0x5}]}}}]}, 0x44}, 0x1, 0x18a}, 0x0) [ 236.440842][T11014] 8021q: adding VLAN 0 to HW filter on device bond1 [ 236.469082][T11026] loop0: detected capacity change from 0 to 132 19:53:16 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r1}}, 0x0) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 19:53:16 executing program 4: setresuid(0x0, 0xee00, 0xffffffffffffffff) r0 = socket(0x1e, 0x4, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xca}, 0x4) 19:53:16 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) 19:53:16 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) 19:53:16 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) [ 236.476935][ T23] audit: type=1400 audit(1678391596.821:449): avc: denied { getopt } for pid=11016 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 236.497194][ T23] audit: type=1400 audit(1678391596.841:450): avc: denied { mounton } for pid=11011 comm="syz-executor.5" path="/root/syzkaller-testdir68335622/syzkaller.hXwZHH/348/file0" dev="sda1" ino=1234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 19:53:17 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r1}}, 0x0) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 19:53:17 executing program 4: setresuid(0x0, 0xee00, 0xffffffffffffffff) r0 = socket(0x1e, 0x4, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xca}, 0x4) 19:53:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x6}, @IFLA_BOND_TLB_DYNAMIC_LB={0x5}]}}}]}, 0x44}, 0x1, 0x18a}, 0x0) 19:53:17 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) 19:53:17 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 19:53:17 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) 19:53:17 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) [ 236.592704][T11031] 8021q: adding VLAN 0 to HW filter on device bond2 [ 236.615292][T11039] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 236.616712][T11044] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 19:53:17 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) 19:53:17 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) 19:53:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x6}, @IFLA_BOND_TLB_DYNAMIC_LB={0x5}]}}}]}, 0x44}, 0x1, 0x18a}, 0x0) 19:53:17 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) [ 236.681152][T11048] 8021q: adding VLAN 0 to HW filter on device bond3 19:53:17 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt(r0, 0x114, 0x5, 0x0, &(0x7f00000000c0)) 19:53:17 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) 19:53:17 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 19:53:17 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) [ 236.728441][T11060] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 236.751506][T11065] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 19:53:17 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x820020, &(0x7f0000000100)={'trans=unix,', {[], [{@context={'context', 0x3d, 'unconfined_u'}}]}}) 19:53:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) 19:53:17 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) 19:53:17 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 19:53:17 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) 19:53:17 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) [ 236.775365][T11073] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 236.788150][T11063] 8021q: adding VLAN 0 to HW filter on device bond4 19:53:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) 19:53:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000007a000101000000000020000007", @ANYRES16=0x0, @ANYRESOCT], 0x20}}, 0x0) 19:53:17 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 19:53:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xc2bcc7530e3ef273, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_TXQLEN={0x8}, @IFLA_ALT_IFNAME={0x14, 0x35, 'dummy0\x00'}]}, 0x44}}, 0x0) 19:53:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000007a000101000000000020000007", @ANYRES16=0x0, @ANYRESOCT], 0x20}}, 0x0) [ 236.837235][T11081] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 19:53:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18}, 0x18}}, 0x0) 19:53:17 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xc2bcc7530e3ef273, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_TXQLEN={0x8}, @IFLA_ALT_IFNAME={0x14, 0x35, 'dummy0\x00'}]}, 0x44}}, 0x0) 19:53:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000007a000101000000000020000007", @ANYRES16=0x0, @ANYRESOCT], 0x20}}, 0x0) 19:53:17 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 19:53:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xc2bcc7530e3ef273, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_TXQLEN={0x8}, @IFLA_ALT_IFNAME={0x14, 0x35, 'dummy0\x00'}]}, 0x44}}, 0x0) 19:53:17 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000007a000101000000000020000007", @ANYRES16=0x0, @ANYRESOCT], 0x20}}, 0x0) 19:53:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) 19:53:17 executing program 3: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:17 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xc2bcc7530e3ef273, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_TXQLEN={0x8}, @IFLA_ALT_IFNAME={0x14, 0x35, 'dummy0\x00'}]}, 0x44}}, 0x0) 19:53:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) 19:53:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) 19:53:17 executing program 3: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) 19:53:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) [ 237.052111][T11126] loop3: detected capacity change from 0 to 2048 19:53:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) [ 237.125741][T11135] loop3: detected capacity change from 0 to 2048 19:53:18 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:18 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x11, 0x0, 0x4) 19:53:18 executing program 3: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:18 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1) 19:53:18 executing program 4: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:18 executing program 2: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:18 executing program 3: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) [ 237.870820][T11146] loop3: detected capacity change from 0 to 2048 [ 237.908478][T11151] loop4: detected capacity change from 0 to 2048 19:53:18 executing program 4: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:18 executing program 2: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) [ 237.921826][T11155] loop2: detected capacity change from 0 to 2048 [ 237.947757][T11157] loop3: detected capacity change from 0 to 2048 19:53:18 executing program 2: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffc}, 0x1c) [ 237.967182][T11159] loop4: detected capacity change from 0 to 2048 [ 237.982480][T11161] loop2: detected capacity change from 0 to 2048 [ 238.042111][T11165] loop2: detected capacity change from 0 to 2048 19:53:19 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:19 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 4: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) read$nci(r1, &(0x7f0000000240)=""/84, 0x54) 19:53:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffc}, 0x1c) [ 238.702895][T11167] loop2: detected capacity change from 0 to 2048 [ 238.725799][ T23] kauditd_printk_skb: 4 callbacks suppressed [ 238.725810][ T23] audit: type=1400 audit(1678391599.141:455): avc: denied { read } for pid=11172 comm="syz-executor.1" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 238.765987][ T23] audit: type=1400 audit(1678391599.141:456): avc: denied { open } for pid=11172 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 238.781599][T11170] loop4: detected capacity change from 0 to 2048 19:53:19 executing program 5: clock_adjtime(0x0, &(0x7f0000000000)={0x9}) 19:53:19 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffc}, 0x1c) 19:53:19 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 5: clock_adjtime(0x0, &(0x7f0000000000)={0x9}) 19:53:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffc}, 0x1c) 19:53:19 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 5: clock_adjtime(0x0, &(0x7f0000000000)={0x9}) [ 238.790234][ T23] audit: type=1400 audit(1678391599.141:457): avc: denied { ioctl } for pid=11172 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 19:53:19 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 19:53:19 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:19 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) 19:53:19 executing program 5: clock_adjtime(0x0, &(0x7f0000000000)={0x9}) 19:53:19 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:53:19 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:19 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 19:53:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) [ 238.991412][ T23] audit: type=1326 audit(1678391599.411:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11193 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd3915a40f9 code=0x0 19:53:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 19:53:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) [ 239.062233][T11204] loop5: detected capacity change from 0 to 2048 [ 239.065938][T11206] loop0: detected capacity change from 0 to 2048 [ 239.146263][T11215] loop2: detected capacity change from 0 to 2048 19:53:19 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 19:53:19 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) [ 239.364440][T11219] loop3: detected capacity change from 0 to 2048 [ 239.403668][T11222] loop2: detected capacity change from 0 to 2048 19:53:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) 19:53:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0xc, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x2, '-'}]}, @NFTA_RANGE_SREG={0x8}, @NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 19:53:20 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) [ 239.849758][ T23] audit: type=1326 audit(1678391600.271:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11225 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd3915a40f9 code=0x0 [ 239.879076][T11232] loop3: detected capacity change from 0 to 2048 [ 239.893798][T11231] loop5: detected capacity change from 0 to 2048 [ 239.894625][T11228] loop0: detected capacity change from 0 to 2048 [ 239.901317][T11233] loop2: detected capacity change from 0 to 2048 [ 239.917477][ T23] audit: type=1326 audit(1678391600.331:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7d54b3d0f9 code=0x0 19:53:20 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:20 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) [ 240.252819][T11240] loop2: detected capacity change from 0 to 2048 [ 240.260563][T11238] loop3: detected capacity change from 0 to 2048 [ 240.264238][T11242] loop5: detected capacity change from 0 to 2048 [ 240.312546][T11244] loop0: detected capacity change from 0 to 2048 19:53:20 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 240.543147][ T23] audit: type=1400 audit(1678391600.961:461): avc: denied { map } for pid=11245 comm="syz-executor.5" path="/dev/sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 19:53:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) 19:53:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:21 executing program 0: r0 = socket(0x23, 0x2, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 19:53:21 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:21 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:21 executing program 0: r0 = socket(0x23, 0x2, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 19:53:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) [ 240.695247][T11251] blktrace: Concurrent blktraces are not allowed on sg0 [ 240.709198][ T23] audit: type=1400 audit(1678391601.131:462): avc: denied { write } for pid=11254 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 240.738075][T11251] blktrace: Concurrent blktraces are not allowed on sg0 19:53:21 executing program 0: r0 = socket(0x23, 0x2, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={0x0}}, 0x0) [ 240.758758][T11257] loop2: detected capacity change from 0 to 2048 19:53:21 executing program 0: r0 = socket(0x23, 0x2, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 19:53:21 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 240.798264][ T23] audit: type=1400 audit(1678391601.151:463): avc: denied { mount } for pid=11248 comm="syz-executor.3" name="/" dev="ramfs" ino=35424 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 240.823928][ T23] audit: type=1326 audit(1678391601.151:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd3915a40f9 code=0x0 19:53:21 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) [ 240.911589][T11268] blktrace: Concurrent blktraces are not allowed on sg0 [ 240.921093][T11270] blktrace: Concurrent blktraces are not allowed on sg0 [ 240.934083][T11268] blktrace: Concurrent blktraces are not allowed on sg0 [ 240.947005][T11270] blktrace: Concurrent blktraces are not allowed on sg0 19:53:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) 19:53:21 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:21 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:21 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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", 0x200) sendfile(r3, r4, 0x0, 0x11f08) 19:53:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15}, {0x6}]}) creat(0x0, 0x0) [ 241.555225][T11277] blktrace: Concurrent blktraces are not allowed on sg0 [ 241.563121][T11279] blktrace: Concurrent blktraces are not allowed on sg0 [ 241.574776][T11277] blktrace: Concurrent blktraces are not allowed on sg0 [ 241.590374][T11279] blktrace: Concurrent blktraces are not allowed on sg0 [ 241.594033][T11280] loop2: detected capacity change from 0 to 2048 19:53:22 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) [ 241.698398][T11286] blktrace: Concurrent blktraces are not allowed on sg0 [ 241.711359][T11286] blktrace: Concurrent blktraces are not allowed on sg0 19:53:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:22 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 241.871166][T11294] blktrace: Concurrent blktraces are not allowed on sg0 [ 241.888300][T11294] blktrace: Concurrent blktraces are not allowed on sg0 19:53:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:22 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:22 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:22 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:22 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.433796][T11303] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.442491][T11301] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.451171][T11303] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.460235][T11306] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.468757][T11301] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.529661][T11308] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.560230][T11301] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x13, r0, 0x0) ftruncate(r0, 0x8001) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 19:53:23 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.604362][T11308] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.612525][T11310] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.621028][T11312] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.669200][T11310] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.685540][T11312] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.692974][T11315] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.798015][T11312] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.848639][T11323] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.914033][T11326] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.921466][T11328] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.933564][T11330] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.940952][T11331] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.947988][T11321] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.955360][T11333] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 242.964387][T11333] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.973549][T11336] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.981016][T11328] blktrace: Concurrent blktraces are not allowed on sg0 [ 242.988500][T11330] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.056147][T11326] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.095323][T11334] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.102661][T11340] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.155064][T11344] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.162404][T11346] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.170706][T11336] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.178055][T11348] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.185236][T11349] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.194495][T11348] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.226453][T11346] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.233797][T11351] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.277726][T11351] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:23 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.376481][T11357] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.384856][T11355] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.392757][T11360] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.400054][T11362] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.407550][T11351] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.439918][T11365] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.472212][T11357] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.479374][T11369] blktrace: Concurrent blktraces are not allowed on sg0 19:53:23 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.491569][T11369] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.499728][T11365] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.506849][T11367] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.514102][T11375] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.576659][T11360] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.607445][T11369] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.648068][T11381] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.657457][T11383] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.664692][T11384] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.672359][T11379] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.679590][T11375] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.686863][T11386] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000000240)='GPL\x00', 0x5, 0xe9, &(0x7f0000000100)=""/233, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:24 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000000240)='GPL\x00', 0x5, 0xe9, &(0x7f0000000100)=""/233, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 243.694151][T11381] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.701358][T11388] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.708568][T11384] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.715687][T11386] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000000240)='GPL\x00', 0x5, 0xe9, &(0x7f0000000100)=""/233, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:24 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000000240)='GPL\x00', 0x5, 0xe9, &(0x7f0000000100)=""/233, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:24 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) [ 243.752522][T11388] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 19:53:24 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) [ 243.798768][T11379] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.817647][ T23] kauditd_printk_skb: 4 callbacks suppressed [ 243.817660][ T23] audit: type=1400 audit(1678391604.241:469): avc: denied { create } for pid=11399 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 243.851798][ T23] audit: type=1400 audit(1678391604.261:470): avc: denied { write } for pid=11399 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 243.886382][T11398] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.893975][T11401] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001240)=[{&(0x7f00000001c0)="1a95b41c0ecc7025d63ba6b455c73fe796d4f01c25bb2aca19b5841424ff81d90d3aeeb79b394b", 0x27}], 0x1) 19:53:24 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 19:53:24 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 19:53:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001240)=[{&(0x7f00000001c0)="1a95b41c0ecc7025d63ba6b455c73fe796d4f01c25bb2aca19b5841424ff81d90d3aeeb79b394b", 0x27}], 0x1) 19:53:24 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)) [ 243.901333][T11404] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.908343][T11403] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.917490][T11407] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001240)=[{&(0x7f00000001c0)="1a95b41c0ecc7025d63ba6b455c73fe796d4f01c25bb2aca19b5841424ff81d90d3aeeb79b394b", 0x27}], 0x1) 19:53:24 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)) 19:53:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:24 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)) [ 243.976613][T11407] blktrace: Concurrent blktraces are not allowed on sg0 [ 243.987619][T11398] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) 19:53:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001240)=[{&(0x7f00000001c0)="1a95b41c0ecc7025d63ba6b455c73fe796d4f01c25bb2aca19b5841424ff81d90d3aeeb79b394b", 0x27}], 0x1) 19:53:24 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x1ff, 0xa0, 0x5, 0x0, 0xfffffffffffffff8}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r3, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000a80)={{r1}, 0x2, &(0x7f0000000140)=[0x10, 0x1], 0x1, 0x1, 0x1}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001340), 0x101980) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r5}, 0x10) r7 = getpgid(0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="d9000000090000000700000040447343ebfb1732d81e3d19f234ee6503ee379266233d0fb818bb8a536597cf72cb526b258b4e0bacd70e21b9e0ebb19f86eb7c863ac856515f72b0fe2230dbf463a1dc54a7134f8cdb57162673cb7921d11dded76bca38977185aa3c5748bbfc9801e9031873170631f44158dc0a1951845f9dee08b8d2346e487a214828500775de09c348288448a0296384e7b07d2df3fd3fac8e7467b20a1c6608b1da46e1810a93f73c83de0d5ee1aa7eda2ad15e4e830edb6ef56bea2d5c9a579245584f19ce1914606e45a9defbf6d42fb3034b47a53ac7899acc6bcfa47da2d1c726e4c5e1f1eb5340d38173a00ce3217c0dfed90da402ff1d5747a3fa5fc730ca3b6720b6960461256f0dd526738d77bf836422f9c0a356679054b01875ba8da4db29399f4c319f8892d740b91c92433bfc7067670690cdd98bfbb194276f12911bb11cc0e1000bb334da6563489ca61bf04acfd34b4f4d0454fd211cff72f9c84ab3667e18d64037fcc97210faaddb2470452be7b838790883196afd08128b360f3475085cebcd421550e66522dc345a83e367584e33aea32c73a168dbe296ba3656f9183a12181c2321b9463aa0ae88ea3802447e2978c6904c7f6074530d3ec4"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=@ipmr_delroute={0x24, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x80, 0x0, 0x80, 0x40, 0xfd, 0x0, 0xff, 0x5, 0x400}, [@RTA_TABLE={0x8, 0xf, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) process_vm_writev(r7, &(0x7f0000001080)=[{&(0x7f0000000600)=""/8, 0x8}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/179, 0xb3}, {&(0x7f0000000ec0)=""/82, 0x52}, {&(0x7f0000000f40)=""/179, 0xb3}, {&(0x7f0000001000)=""/95, 0x5f}], 0x7, &(0x7f00000012c0)=[{&(0x7f0000000c40)=""/13, 0xd}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000001180)=""/134, 0x86}, {&(0x7f0000001240)=""/90, 0x5a}], 0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x48, 0x7, @scatter={0x4, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000c80)=""/202, 0xca}, {&(0x7f0000000780)}]}, &(0x7f00000002c0)="8076530ca7d2a1e05764f273fcefa03e94fa2ee873b96f2a6e0428506c41cd56858e9b3ed30c38008eea79180fae3e5a2a91afa105d7a7a55965df93acbea1ea3f9002ccf1601318", &(0x7f0000000440)=""/124, 0x8, 0x24, 0x0, &(0x7f0000000380)}) perf_event_open(&(0x7f0000001380)={0x1, 0x80, 0x2, 0x5, 0xfe, 0x7, 0x0, 0x9103, 0x2000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x9}, 0x4001, 0x100, 0x4, 0x4, 0xfffffffffffffffb, 0x3f1, 0x101, 0x0, 0x2, 0x0, 0x7050}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x7c}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000a00)={'\x00', 0x7, 0xcc, 0x26, 0x40, 0x8}) 19:53:24 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)) 19:53:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x1, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 244.045702][T11407] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) 19:53:24 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) 19:53:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) [ 244.101024][T11437] blktrace: Concurrent blktraces are not allowed on sg0 [ 244.115220][T11438] blktrace: Concurrent blktraces are not allowed on sg0 [ 244.119231][ T23] audit: type=1400 audit(1678391604.541:471): avc: denied { create } for pid=11425 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 244.133385][T11437] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x1, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 244.161556][T11438] blktrace: Concurrent blktraces are not allowed on sg0 [ 244.203454][ T23] audit: type=1400 audit(1678391604.571:472): avc: denied { connect } for pid=11425 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 244.225467][ T23] audit: type=1400 audit(1678391604.571:473): avc: denied { write } for pid=11425 comm="syz-executor.3" path="socket:[35780]" dev="sockfs" ino=35780 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 244.289075][T11451] blktrace: Concurrent blktraces are not allowed on sg0 19:53:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:24 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) 19:53:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x1, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) 19:53:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:24 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:24 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xd3, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/1, 0x1) 19:53:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x1, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) [ 244.446156][ T23] audit: type=1400 audit(1678391604.861:474): avc: denied { write } for pid=11456 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 19:53:24 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:24 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:25 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:25 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:25 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:25 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:26 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:26 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:26 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x58, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 19:53:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:26 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:26 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:26 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40142}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x8008662c, 0x0) 19:53:26 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40142}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x8008662c, 0x0) 19:53:26 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40142}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x8008662c, 0x0) [ 246.387965][T11541] ================================================================== [ 246.396265][T11541] BUG: KCSAN: data-race in filemap_read / generic_write_end [ 246.403569][T11541] [ 246.405887][T11541] write to 0xffff88810a98b338 of 8 bytes by task 11532 on cpu 0: [ 246.413604][T11541] generic_write_end+0xb4/0x360 [ 246.418621][T11541] ext4_da_write_end+0x4bd/0x630 [ 246.423568][T11541] generic_perform_write+0x253/0x3d0 [ 246.428857][T11541] ext4_buffered_write_iter+0x234/0x3e0 [ 246.434411][T11541] ext4_file_write_iter+0xd7/0x10e0 [ 246.439964][T11541] vfs_write+0x45a/0x750 [ 246.444246][T11541] ksys_write+0xeb/0x1a0 [ 246.448502][T11541] __x64_sys_write+0x42/0x50 [ 246.453290][T11541] do_syscall_64+0x41/0xc0 [ 246.457809][T11541] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 246.463896][T11541] [ 246.466238][T11541] read to 0xffff88810a98b338 of 8 bytes by task 11541 on cpu 1: [ 246.476925][T11541] filemap_read+0x247/0x680 [ 246.481711][T11541] generic_file_read_iter+0x76/0x320 [ 246.487168][T11541] ext4_file_read_iter+0x1cc/0x290 [ 246.492362][T11541] generic_file_splice_read+0xe3/0x290 [ 246.498050][T11541] splice_direct_to_actor+0x25a/0x5f0 [ 246.503426][T11541] do_splice_direct+0x104/0x180 [ 246.508444][T11541] do_sendfile+0x3b8/0x950 [ 246.512958][T11541] __x64_sys_sendfile64+0x110/0x150 [ 246.518163][T11541] do_syscall_64+0x41/0xc0 [ 246.522567][T11541] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 246.528454][T11541] [ 246.530769][T11541] value changed: 0x0000000000a0d000 -> 0x0000000000a0e000 [ 246.537887][T11541] [ 246.540194][T11541] Reported by Kernel Concurrency Sanitizer on: [ 246.546349][T11541] CPU: 1 PID: 11541 Comm: syz-executor.1 Not tainted 6.3.0-rc1-syzkaller-00106-g44889ba56cbb #0 [ 246.556751][T11541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 246.566811][T11541] ================================================================== 19:53:27 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:27 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40142}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x8008662c, 0x0) 19:53:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) [ 246.720947][ T23] audit: type=1400 audit(1678391607.141:475): avc: denied { read write } for pid=11548 comm="syz-executor.3" name="rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 246.748501][ T23] audit: type=1400 audit(1678391607.141:476): avc: denied { open } for pid=11548 comm="syz-executor.3" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendfile(r1, r0, 0x0, 0x1000807d0) 19:53:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:27 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:27 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8080, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001f80)=""/4111, 0x45}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="6a2bfc739b6eff5f0010ff888a0f124127e3d1c2f7bddc2f451d44c2ace4151180156f3a128caeac12d16e2f205a3fd62f9d12ca4b34afb29a3ad4f12b71291e7d03c608fa", 0x45, 0x0, 0x0, 0x0) 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:28 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}, {}, {}, {}], 0x65) 19:53:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x5}]}]}, 0x34}}, 0x0) 19:53:28 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x7, &(0x7f00000011c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @initr0]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:28 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}, {}, {}, {}], 0x65) 19:53:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x5}]}]}, 0x34}}, 0x0) 19:53:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) 19:53:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x7, &(0x7f00000011c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @initr0]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:28 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}, {}, {}, {}], 0x65) 19:53:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x5}]}]}, 0x34}}, 0x0) 19:53:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 19:53:28 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:28 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x5}]}]}, 0x34}}, 0x0) 19:53:28 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}, {}, {}, {}], 0x65) 19:53:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 19:53:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x7, &(0x7f00000011c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @initr0]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 19:53:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:28 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x7, &(0x7f00000011c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @initr0]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:53:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:28 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 19:53:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:28 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:29 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:29 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) close(r1) 19:53:29 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:29 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x1, 0x24, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000540), &(0x7f0000000600)=""/229}, 0x20) 19:53:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:29 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:29 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 19:53:29 executing program 0: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 19:53:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:29 executing program 0: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 19:53:29 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 248.667114][ T23] audit: type=1400 audit(1678391609.081:477): avc: denied { mount } for pid=11667 comm="syz-executor.3" name="/" dev="hugetlbfs" ino=36320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 19:53:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x10000000043, 0x20) r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 19:53:29 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 19:53:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:29 executing program 0: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 248.781878][ T23] audit: type=1400 audit(1678391609.121:478): avc: denied { mount } for pid=11675 comm="syz-executor.0" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 248.827419][ T23] kauditd_printk_skb: 2 callbacks suppressed [ 248.827432][ T23] audit: type=1400 audit(1678391609.201:481): avc: denied { write } for pid=11689 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 19:53:29 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:29 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 19:53:29 executing program 0: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x28, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 19:53:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 19:53:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 19:53:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:30 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 0: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 19:53:30 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:30 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:30 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 0: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 0: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:30 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:31 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:31 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:31 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:32 executing program 2: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:32 executing program 4: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000000240)='o', 0x1}], 0x1}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x40}, 0x8) 19:53:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:32 executing program 2: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:32 executing program 4: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 2: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 4: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:33 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 2: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 0: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 4: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:33 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 2: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 4: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 0: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 3: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000002b1, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x1f, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:53:34 executing program 2: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 4: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 0: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 1: socket(0x2b, 0x2, 0x10000002) r0 = fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200140, 0x8) fsmount(r0, 0x1, 0x1) r1 = fsmount(r0, 0x0, 0x89) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xfffffe00}, 0x4) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x49) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) listen(0xffffffffffffffff, 0xc) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xcb, 0x7, 0x0, 0x3, 0x0, 0x0, 0x155c2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200a, 0x80000000, 0x3, 0x3, 0x0, 0x800, 0x100, 0x0, 0x1ff, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe7bdfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="bb44070101"], 0x20000600}}, 0x0) syz_clone(0x72a66000, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x48071}, 0x40800) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 19:53:34 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000680)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "38eefd", 0x10, 0x3a, 0x0, @dev, @mcast2={0xff, 0xc0}, {[], @ndisc_ra}}}}}, 0x0) 19:53:34 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x1000, 0x2f00, &(0x7f0000000180)) 19:53:34 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000680)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "38eefd", 0x10, 0x3a, 0x0, @dev, @mcast2={0xff, 0xc0}, {[], @ndisc_ra}}}}}, 0x0) 19:53:34 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x1000, 0x2f00, &(0x7f0000000180)) 19:53:34 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000680)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "38eefd", 0x10, 0x3a, 0x0, @dev, @mcast2={0xff, 0xc0}, {[], @ndisc_ra}}}}}, 0x0) 19:53:34 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x1000, 0x2f00, &(0x7f0000000180)) 19:53:35 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x1000, 0x2f00, &(0x7f0000000180)) 19:53:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@gettaction={0x38, 0x32, 0x209, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x2}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x38}}, 0x0) 19:53:35 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000680)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "38eefd", 0x10, 0x3a, 0x0, @dev, @mcast2={0xff, 0xc0}, {[], @ndisc_ra}}}}}, 0x0) 19:53:35 executing program 2: set_mempolicy(0x1, &(0x7f0000000100)=0x3ff, 0x4) syz_open_dev$loop(&(0x7f0000000000), 0x5c5d, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004000, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @multicast2, 0x0, 0x0, 'sh\x00', 0x10, 0x100000, 0x73}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001840)={'vcan0\x00', 0x0}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00