001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x3e0000000000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x30000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x2, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:18 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe"]) 12:38:18 executing program 1: kexec_load(0x0, 0x4000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xaa000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x1000000000000000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x3, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 1: kexec_load(0x0, 0x3e0000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe"]) 12:38:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x31000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x20000) 12:38:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xab000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:19 executing program 1: kexec_load(0x0, 0x8000a0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe"]) 12:38:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x32000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x8ac0) bind$rose(r0, &(0x7f0000000080)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x4, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xac000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:19 executing program 1: kexec_load(0x0, 0x10000000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8f"]) 12:38:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x33000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xad000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:19 executing program 1: kexec_load(0x0, 0x40000000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8f"]) 12:38:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x5, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x2) accept4$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10, 0x80000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x34000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xae000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8f"]) 12:38:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x6, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 1: kexec_load(0x0, 0xa0008000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x1f, 0x8}}, 0x30) tee(r1, r0, 0x3f, 0x9) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x100, {0x8000, 0x20, 0xfffffffffffffffd, 0xffff, 0x2, 0x8}, 0x80000001, 0x80000001}, 0xe) 12:38:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x35000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b"]) 12:38:20 executing program 1: kexec_load(0x0, 0x3e0000000000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xaf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x7, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x36000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x20) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1000, 0x3}) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b"]) 12:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x8, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 1: kexec_load(0x0, 0x8000a0ffffffff, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x20000) ioctl$NBD_DISCONNECT(r0, 0xab08) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x37000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x9, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 1: kexec_load(0x0, 0x1000000000000000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b"]) 12:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x38000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0xa, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 1: kexec_load(0x0, 0x4000000000000000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb"]) 12:38:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x82e8, 0x80) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000001c0)=0x101) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) write$P9_RSETATTR(r1, &(0x7f0000000200)={0x7, 0x1b, 0x1}, 0x7) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) 12:38:21 executing program 1: kexec_load(0x0, 0xffffffffa0008000, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0xb, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x39000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb"]) 12:38:21 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x10) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0xc, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0xfffffffffffffff1, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x2000) write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) setfsuid(r1) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb"]) 12:38:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:21 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x3e00) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0xd, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20100) 12:38:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb391a"]) 12:38:21 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x4000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x3e0000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0xe, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:22 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xffffffffffffbb54, 0x4) 12:38:22 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x8000a0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0xf, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:22 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb"]) 12:38:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000040)={0xdb, 0x0, 0x301f, 0xb9b, 0x4b9, {0x200, 0x1000}, 0x1}) 12:38:22 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x10000000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0x0) r1 = request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='ppp1\x00', 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000340)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x2}, r1) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0xa080, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000080)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x40000000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:22 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb"]) 12:38:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:22 executing program 1: kexec_load(0x0, 0x0, 0x0, 0xa0008000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:23 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb"]) 12:38:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x480, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xba000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x300}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x3e0000000000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x2) accept4$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10, 0x80000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80800) ioctl$sock_ifreq(r1, 0x8995, &(0x7f00000001c0)={'lo\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) kexec_load(0x0, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) r3 = dup3(r0, r0, 0x80000) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x181040, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r3, 0x5, 0x6, r4}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3e00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x8000a0ffffffff) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x2) accept4$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10, 0x80000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x100, 0x200002) ioctl$RTC_WIE_OFF(r1, 0x7010) fstatfs(r0, &(0x7f0000000040)=""/72) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3f00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x1000000000000000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x2) accept4$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x10, 0x80000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x40000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x4000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x4000000000000000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x80004, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f0000000080)={@initdev, 0x0}, &(0x7f00000000c0)=0x14) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, r1, 0x1}, 0xc) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x4, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:24 executing program 1: kexec_load(0x0, 0x0, 0x0, 0xffffffffa0008000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x75a2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x4, &(0x7f00000005c0)=[{0x0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x41000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x80000) getpeername(r0, &(0x7f0000003b80)=@hci={0x1f, 0x0}, &(0x7f0000003c00)=0x80) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f0000000140)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c, &(0x7f0000003980)=[{&(0x7f0000002380)="43f2f7a5e93340b71665a96f2818e855a6bbfc2293961fddd083c533db36efc4dbe8ba2670bb1a3ad197d4151253fac873927eccf4353bce29ae095ae2818c1a51bcb9d50cfa9b7a24bfe5ae6fffdb59f15985a60c255afb3b66777d382387d8bbd7b94be5770113e5adfbff940315657b2e6173a31c36c02bcabd0a14748d0d5ee328f1f838ef2f8ccb52160ea0964d9a5ca16b6278961989d435c5240017202c637da8b222c5", 0xa7}, {&(0x7f0000002440)="bca7f83c418ad53c1fd8513e92961c3b4fe8f28eeff73695eabbc955442251319277bb75bc875902a19659e3452bb673615b4e996344e4eeacad4613240b2f30c9361308ca9bbfd9275cd1a2024385ab933cd8cad5344d742af6f1c3ccd9b0e4ecea4a6e7bee1ae18626a4f342fa260c1662566ea8e3d4aa3c5267c4916ce1cbfddbc32e92513e49050adf0d4350cfb2fbd18960cf7f0eafa274dca7814b8c61f8883f0e057cdb292ff78cda79224359371c96b7ec716ffab15a75ef1a799c282ca89ae35095b960aeaac78c9b0580b16603133051bc1d434633369633ca0c77c411b461b4deb759670324c01a", 0xed}, {&(0x7f0000002540)="6c7b7c706ebbcee7e0f4127a16f5bd025169473fafc7dd20346fe35a2223f337c320f3fdcf10ca4cb818893b9d07490eb6ab945b96ee593571d523f0881a8d53365655f4aef77959033775a8b5da2ebcb10a809aabab492046a7ce8e88b89d2812a502fe6a6d65c93d3b7592dd76673ab73cd72595e2fe2b26db31cb53d68cb57dbd6d53617d4fc0d32d4a005b26eaeff3768962ffea56f2041b765dbd1e60412df6e04bdac042e3b8ed3f25b04be080b2a5f2d20cf11aae82182ba90b5bc9b2f1038419b5486fd2ce182bcc929088edc85f347e0c922d6b1d44f095cceafc615c08de8aa82b7d73871e65e1c76c9c55c678570df8c5", 0xf6}, {&(0x7f0000002640)="3b6972655c7815d2a692407c069b70", 0xf}, {&(0x7f0000002680)="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", 0x1000}, {&(0x7f0000003680)="3d2a6b3a9992968da08e026c08d557d906a329aca72e2ae1bc2ff5b029a91758dc420489c6457a3218ba5974b5d81adb490847c2f2be9f5885e4deb4135c0f12854f970d530b8fe09e2b9b737f6088def9583f4327b28911b4a7fba6772df7904c9214eec1fdb1963345553ef1a214b8f61ad72f5b7dece8a6797b35cbc3864c8557755480541192d343bb1b1cf2efcb4c12a66b05b58b570c41d7e9273f7fa14522e6fd0a0d452907a9f676d68ee3f348be07e8b0b706708377daaaac0fb2cada1d362fea79992a3a436b4adaa45cb6b791cfdb", 0xd4}, {&(0x7f0000003780)="7d018523c2d70389105fb5d87096ff1ac41dee187e387a2bcd21570c34a3762de5696b6e205df3c72187a5fac5d46fc774c3e40be8678df62d17ff2f76a720f18f28067c85a8ef55855ec63f8947c2adf047eb831432f0af44cee8b6d5ec8c79fe48e6462db35740898b5713735d7f98f02a7f3900ea3d3773de18251245876d693ee6915872849277da6bfd9af3c6465afd207128ff52d29f0e9b", 0x9b}, {&(0x7f0000003840)="53f7bb74f8dbdb0aa7ddfebed9c2f6b335c349460d06cf2663b82f6621438eb4836331feadea349e11c097060e141fcd896fcff22f3125a1a792d1e004a0bef69374cc960f0691a51c1f41391e77a1ce6d628d2acba6594590cb869ced78150d532e576f7e5c632457b3ee3bbf76a3689ac238cec0b53d24567b67991a651b91f16ff7be5278d247cd51159b9cc137caea94ce0b15a4e8fd505ca66671cc46f135837d48d302e4e5017018a91d49615372e25d3f6050948d14f0e88c5e290bb9474f7662af786795007ad5bc94e0cdcd14b269", 0xd3}, {&(0x7f0000003940)="7d8a8f3d94527d67fa06106b0745a9b836f50d12759d4a52bea4", 0x1a}], 0x9, &(0x7f0000003a40)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x3a, 0x8, 0x2, 0x400, 0x0, [@mcast1, @local, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @rthdrdstopts={{0x50, 0x29, 0x37, {0x3e, 0x6, [], [@calipso={0x7, 0x20, {0x8001, 0x6, 0xffff, 0x13, [0x3, 0x200, 0x1f]}}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x818f}}], 0xc0}}, {{&(0x7f0000003b00)={0xa, 0x4e20, 0x7, @empty, 0x100000000}, 0x1c, &(0x7f0000003b40), 0x0, &(0x7f0000003c40)=[@hoplimit={{0x14, 0x29, 0x34, 0x80000000000}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x126}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}, r1}}}, @hopopts={{0x28, 0x29, 0x36, {0xf7, 0x1, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @pad1]}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x0, 0x1, [], [@enc_lim={0x4, 0x1, 0xcb9}, @pad1, @enc_lim={0x4, 0x1, 0x1ff}]}}}], 0xc0}}, {{&(0x7f0000003d00)={0xa, 0x4e23, 0x100000001, @dev={0xfe, 0x80, [], 0x2b}, 0x1}, 0x1c, &(0x7f0000005040)=[{&(0x7f0000003d40)="e2c0cd9b2cc8c98444fbf91bd41882777052b0c53a4d423c6ace842feb50911fc4eb3b2a74cdc1f9de956b3d1574c6fb89834ebb5f5a8d5f67760feeee0d06028b825b799698e81245c24dcff6bdfb20e7f4af0d7e1a79f8344d43b7c86726ac5763a95456a410741e08ada2e8eef193ed269eca26ede0450218b09843e816d6fa2539457b56f7c7b5b3649d9fecc758a011b893ef1e070107e2049d160d7427d5d4fa447221a1f67bcd50e3b0865e39", 0xb0}, {&(0x7f0000003e00)="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", 0x1000}, {&(0x7f0000004e00)="af45ed6e09c923fd6e3d7eff42c8fdfc5f54622e224742896ab3b354346dc80ccf928bf3defe8e3121be664ed22b4dd4fff69baee1ce4c9e194ed48f31fa3879f9250871b31f0489149d58", 0x4b}, {&(0x7f0000004e80)="3a48f8d720dc91a6f807754a930ef7826b77c2a2b2d35125454144881694e03f0da7f8a70eb88d2c951e3ef957db7a8777182c9027505f6176d5aa750d2669758ced9e1dfe4c66d4571610ef1634cde3a728f3dc8da8c6eb3403dbdc243e93de704563cffefe785d7c9e9f171a76a032282cf1f169d247d9db3e3d580800a9264fba5508cd0dd47270436931b7c19ed250777e6bd68b6229a90ccbd38792151cda1bc1d8e6023c354285e50f0c9a8b7be7294d83c2ddc281f719240e839613fd9f927fda9583795b0542a08429e30fcbaa8c698c750c25ee6703fd9ff9fedb6ac41d95ad011e4870204fde2493dd3698e62304414d55d5", 0xf7}, {&(0x7f0000004f80)="95fc2a95e74cb013e0774530166b069ef996527f9668c5992ae7dd6a8018fd2417484833e2aba927c351576c63c3bf07e910176e97e9e41e7a440420b44077c6da0bfe9d175ec610cb7ef88da6380755ec4cea6af4ae80ff5dd2b4421eea49fb288fa4f9dea8d724272d90d799cf8eba977a6b9e5e2c2bcf9f030482a0d6e2d543f695753addd5025ae2e82be9edee13f68dc3abe6dfd4993ca8d7db50409e4ceaee499d4efdb0c0b8a9bdfebf4c0e0bea959d", 0xb3}], 0x5, &(0x7f00000050c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xffffffff}}, @hopopts={{0x50, 0x29, 0x36, {0x0, 0x6, [], [@calipso={0x7, 0x10, {0xfffffffffffffffd, 0x2, 0x10000, 0x2000000000000000, [0xffff]}}, @hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xf2}, @ra={0x5, 0x2, 0x1a63}]}}}], 0x68}}], 0x3, 0x800) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000300)={0x0, 0x0, 0x2080}) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000040)=0x1) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0x3}, 0x2) 12:38:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbe000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x7, 0xbce, 0xfff, 0x0, 0x1, 0xfffffffffffffffb, 0x80, 0x10000, 0x3, 0x0, 0x1, 0x3, 0x0, 0x40, 0x0, 0x7fff, 0x80000001, 0xacc, 0x7}) 12:38:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xff0f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000080)='mime_typeGPLwlan1][!\\}\x00', r1}, 0x1d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = dup2(r0, r3) write$P9_RLINK(r5, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000180)={@dev}, &(0x7f00000001c0)=0x14) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$VIDIOC_DBG_G_REGISTER(r6, 0xc0385650, &(0x7f0000000040)={{0x3, @addr=0x101}, 0x8, 0x6a, 0x1ff}) socket$kcm(0x29, 0x5, 0x0) 12:38:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:24 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x2) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000800)={&(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000400)="65c74d26ba6d8da78c41d305592d95828108c225616ac8b429b4748d3f44827c4863b7377b040517b34abbb245c4c40826c82160b5e82e5ee53b09088fee80472571e3ea1e4665a4bbe6fae3591ba634c28a4e677cce70d226fccf2bcd38e86dc3c3c1808b10da8194b5aee5746ea9daa0722a456a7d1328f9a47e3ee0fa02c058194dd12d1deb5278aee66453ad325dc48b51837ff51ea8139b7535d0dbb44be5a558c7dbd120d107aec8074f65781a54541709c1af4b83b572b2eeba476cf00d13e207d0f1b44e380aea1e957e2fdbbf8e1a0719672857c1fec46407f1714b65e150e4145989", 0xe7}, {&(0x7f0000000500)="e2cbe0da0e735459e305a89307e33f3e6f664e905d583f9a3c375163ef2fac3d02f16158d102ae4c7629aea6067f23b84830f2512780b5755faf243b03dfca6ab280cd8b1ccc15a8bc851dc9fe3f8028263448da0c576d4bb6af77b59af1014d12d3a50c8f2b009e2a322f54b257999cac4a4243b58cf2a69e645a63bd71b1b8117fc6fdd0384583f9956f37bd8643afa7f31314cfd8d1194aa8f4b0662a19b8ea3adc7c774ce0f1e027d30e19ca634bf094729e8a9e32e802fe3f11a4549d336a0f06", 0xc3}, {&(0x7f0000000600)="40e738dafb245e8094a037ccbc7b85ebe7c70b52fdff5ff3d964aeb311d1c86216b0b0295954dba79e22f2f9f2c617eb8d3f098e84ea98ee8800392add750214484ad4f51cf8732325104f9c5d1a5aca4eb443b700ebab2eab3fae198441edb0829cad2f2b54", 0x66}, {&(0x7f0000000300)="3535c6d5d1fbb3a8360b0a0872c8e2f784f35c276cc4079434ed7979e495921005ba332321d594a82ce3aad67c73fd", 0x2f}, {&(0x7f0000000680)="2b8fee3afe773bfd1949b4a3b4b7a154e39d1df4f4f24dc5e4a0bcfb3e986da10578", 0x22}, {&(0x7f00000006c0)="94b4cc00cf2217e726254651c3487a189cfdba759a754e70d0fe62edb7d81cf6a1f379ff91230f4b6523c079295dc39cbdc4dcff6e38b3", 0x37}], 0x6, &(0x7f0000000780)=[@ip_retopts={{0x40, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x7, [@remote]}, @end, @ra={0x94, 0x6, 0x2}, @generic={0xc7, 0x2}, @lsrr={0x83, 0x1f, 0x7, [@loopback, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}]}]}}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}], 0x70}, 0x4000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000340)={0x8}) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x8, 0xfd, 0x1, 0x1, 0x1, 0x6, 0x7, 0x80000001, 0x4976, 0x6, 0x8001, 0x80, 0x1, 0x9, 0x9, 0x3a}}) r4 = socket$rds(0x15, 0x5, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10840, 0x0) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)=""/212, 0xd4}], 0x2) write$UHID_INPUT2(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="0c0000000000aa1de95c522a5d13f3f40229ffff88"], 0x6) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x40000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9fbff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x42000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9ffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x40000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:24 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x9, 0x1, 0x2, 0x6, 0x0, 0x6, 0x50, 0x5, 0x1, 0x0, 0x9, 0x8, 0xd84, 0x6, 0x5, 0x7, 0x40, 0xf59, 0x55, 0x17d5, 0x2, 0x40, 0x7fffffff, 0xfffffffffffffffb, 0x200, 0xffffffffffffff9c, 0x3, 0x1, 0xe5, 0x4, 0x7fffffff, 0x1, 0xad, 0x0, 0x5, 0x8, 0x0, 0xf355, 0x6, @perf_config_ext={0x100, 0x800}, 0x1, 0x7f, 0x9, 0x7, 0x1f, 0x7, 0x9}, r1, 0x7, r0, 0x2) 12:38:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbffff, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x40000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x43000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xbffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:25 executing program 1: kexec_load(0x40401, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80800) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/pid\x00') 12:38:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x10000000000009, 0x200001) setsockopt$llc_int(r0, 0x10c, 0xf, &(0x7f0000000040)=0x7ff, 0x4) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x4, 0x3, 0x2}}, 0x14) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000000)={0x8001, 0x0, 0x100000001, 0x6, 0xfffffffffffffffa, 0x8}) write$P9_RLCREATE(r1, &(0x7f00000000c0)={0x18, 0xf, 0x1, {{0x2, 0x0, 0x7}, 0x3}}, 0x18) 12:38:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x41000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x44000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xc67a0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x45000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xffffffff, 0x20fe6d2849749616, 0x0, 0x2a0002) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xb4) 12:38:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x41000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 1: kexec_load(0x2, 0xffffffffffffff88, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') clock_settime(0x1, &(0x7f0000000180)={0x0, 0x1c9c380}) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x9c, r1, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0xd6cd191ad47d175a) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000425bd7000fcdbdf25053e730034000100100004007564703a73790200000000000000010069623a626373683000000000100001006574683a767863616e310000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 12:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000000c0)={r1}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x46000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)=0x7) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x100, 0x0) 12:38:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x30000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x47000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x405aa6}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x141, 0x0, 0xffffdfffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x86881, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) 12:38:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x48000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x402, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20003) 12:38:26 executing program 1: kexec_load(0xfffffffffffffffd, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x1) 12:38:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x2d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x605aa6}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:26 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x22, "49549c3a79bfc8b5ccf97146bbcab3b06eaf30c490d899324d49182ce804cbee72dc"}, &(0x7f0000000100)=0x2a) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r1, 0x2}, 0x8) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x49000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc67a0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x8000a0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x400000002, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x105200) 12:38:26 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x440000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'teql0\x00', 0x8000}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xb01896}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x24000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x2000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x7, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @random}]}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0x30, 0xffffffffffffffda, 0x1, [{0x2, 0xff, 0x1, 0x3, '}'}]}, 0x30) setsockopt$llc_int(r0, 0x10c, 0xd, &(0x7f0000000080)=0x6, 0x4) 12:38:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x24000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xb04790}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:27 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x547cb8a0c3d1f878, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) kexec_load(0x0, 0xfdb6, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) 12:38:27 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:27 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x82000, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x200280) ioctl$RTC_WIE_OFF(r0, 0x7010) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x3, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0xfffffffffffffffe, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) setsockopt(r2, 0x8000, 0x6, &(0x7f00000000c0)="a0df15fe8c09e02ef0664200195b300f31ae4f0b2f309cb290d2ade37cb1a30e911535cfa14e81890e86bf9ba8a88a32045dc2787b38faf6535b", 0x3a) sync_file_range(r0, 0x100002, 0x401, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000002c0)={{0x0, @multicast1, 0x4e20, 0x2, 'sed\x00', 0x8, 0x0, 0x71}, {@empty, 0x4e21, 0x1, 0x2, 0x6, 0xbbf}}, 0x44) waitid(0x1, r4, &(0x7f0000000100), 0x8, &(0x7f0000000200)) kexec_load(0x0, 0xfffffffffffffe8c, 0x0, 0x320000) 12:38:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xc01896}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 752.422563][ T4392] FAULT_INJECTION: forcing a failure. [ 752.422563][ T4392] name failslab, interval 1, probability 0, space 0, times 0 12:38:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xca000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 752.501855][ T4392] CPU: 1 PID: 4392 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 752.510941][ T4392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.521007][ T4392] Call Trace: [ 752.524321][ T4392] dump_stack+0x172/0x1f0 [ 752.528685][ T4392] should_fail.cold+0xa/0x15 [ 752.533295][ T4392] ? fault_create_debugfs_attr+0x180/0x180 [ 752.539126][ T4392] ? ___might_sleep+0x163/0x280 [ 752.544022][ T4392] __should_failslab+0x121/0x190 [ 752.548974][ T4392] should_failslab+0x9/0x14 [ 752.553487][ T4392] __kmalloc+0x2e0/0x770 [ 752.557751][ T4392] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 752.563506][ T4392] ? rcu_read_lock_sched_held+0x110/0x130 [ 752.569247][ T4392] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 752.575001][ T4392] tomoyo_realpath_from_path+0xcd/0x7a0 [ 752.580563][ T4392] ? tomoyo_path_number_perm+0x193/0x520 [ 752.586211][ T4392] tomoyo_path_number_perm+0x1dd/0x520 [ 752.591680][ T4392] ? tomoyo_path_number_perm+0x193/0x520 12:38:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xc04790}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 752.597327][ T4392] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 752.603182][ T4392] ? __fget+0x384/0x560 [ 752.607362][ T4392] ? ksys_dup3+0x3e0/0x3e0 [ 752.611792][ T4392] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.618046][ T4392] ? fput_many+0x12c/0x1a0 [ 752.622524][ T4392] tomoyo_file_ioctl+0x23/0x30 [ 752.627306][ T4392] security_file_ioctl+0x77/0xc0 [ 752.632270][ T4392] ksys_ioctl+0x57/0xd0 [ 752.636445][ T4392] __x64_sys_ioctl+0x73/0xb0 [ 752.641040][ T4392] do_syscall_64+0xfd/0x6a0 [ 752.645542][ T4392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.645568][ T4392] RIP: 0033:0x4592c9 [ 752.645583][ T4392] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.645590][ T4392] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.645604][ T4392] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 752.645611][ T4392] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 12:38:27 executing program 1: r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x480, 0x0) sendfile(r0, r1, &(0x7f0000000080), 0x3) kexec_load(0x100000000000000, 0xffffffffffffffd3, 0x0, 0x2) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f00000000c0)=0x4000000000001) [ 752.645619][ T4392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 752.645627][ T4392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 752.645633][ T4392] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 [ 752.652809][ T4392] ERROR: Out of memory at tomoyo_realpath_from_path. 12:38:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x3ac0, 0x20080) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x20000000020000) 12:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xd0ffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) 12:38:28 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 753.119060][ T4436] FAULT_INJECTION: forcing a failure. [ 753.119060][ T4436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 753.132328][ T4436] CPU: 0 PID: 4436 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 753.141367][ T4436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.151424][ T4436] Call Trace: [ 753.151453][ T4436] dump_stack+0x172/0x1f0 [ 753.151474][ T4436] should_fail.cold+0xa/0x15 [ 753.151496][ T4436] ? fault_create_debugfs_attr+0x180/0x180 [ 753.169492][ T4436] ? lock_downgrade+0x920/0x920 [ 753.169515][ T4436] should_fail_alloc_page+0x50/0x60 [ 753.179553][ T4436] __alloc_pages_nodemask+0x1a1/0x900 [ 753.184938][ T4436] ? kasan_check_read+0x11/0x20 [ 753.189800][ T4436] ? mark_lock+0xc0/0x11e0 [ 753.194406][ T4436] ? __alloc_pages_slowpath+0x25b0/0x25b0 [ 753.194423][ T4436] ? kasan_check_read+0x11/0x20 [ 753.194445][ T4436] ? fault_create_debugfs_attr+0x180/0x180 [ 753.194464][ T4436] cache_grow_begin+0x90/0xbb0 [ 753.205025][ T4436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.205046][ T4436] __kmalloc+0x6af/0x770 [ 753.205066][ T4436] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 753.205085][ T4436] tomoyo_realpath_from_path+0xcd/0x7a0 [ 753.237533][ T4436] ? tomoyo_path_number_perm+0x193/0x520 [ 753.243186][ T4436] tomoyo_path_number_perm+0x1dd/0x520 [ 753.248661][ T4436] ? tomoyo_path_number_perm+0x193/0x520 [ 753.254310][ T4436] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 753.260167][ T4436] ? __fget+0x384/0x560 [ 753.264346][ T4436] ? ksys_dup3+0x3e0/0x3e0 [ 753.268770][ T4436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.275047][ T4436] ? fput_many+0x12c/0x1a0 [ 753.279480][ T4436] tomoyo_file_ioctl+0x23/0x30 [ 753.284257][ T4436] security_file_ioctl+0x77/0xc0 [ 753.289217][ T4436] ksys_ioctl+0x57/0xd0 [ 753.293395][ T4436] __x64_sys_ioctl+0x73/0xb0 [ 753.297997][ T4436] do_syscall_64+0xfd/0x6a0 [ 753.302516][ T4436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.308426][ T4436] RIP: 0033:0x4592c9 [ 753.312328][ T4436] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.332029][ T4436] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 753.340462][ T4436] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 753.348444][ T4436] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 753.356429][ T4436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:38:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x0) kexec_load(0x0, 0xed, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x10000, 0xffffffff, 0x4c3, 0x2, 0x7fff, 0x3ff}}, 0x8) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000140)={0x4, 0xac, 0xd8, 0x4, 0x7}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) getegid() 12:38:28 executing program 1: kexec_load(0x1, 0x0, 0x0, 0x3e0004) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 753.364413][ T4436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 753.372390][ T4436] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xf074a2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400080, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000040)={0xffbffffffffefffb}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000100)={0x1, 0x2}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x1f, 0x3}, 0x14) 12:38:28 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r1, 0x80000, r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x50000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xce000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:28 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x1000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:28 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @local}}, [0xffffffff, 0xa9, 0xc6, 0x1, 0x7998, 0x3, 0xfff, 0x3ff, 0x7ff, 0x8, 0x5, 0x4, 0x0, 0x8001]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x33c1, 0x2, 0x3, 0xffffffffffffff80, 0xffffffffffff662e}, 0x14) socket$inet_sctp(0x2, 0x5, 0x84) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:29 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r1, 0x408, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xd6dd68385cab470f, 0x0) fallocate(r2, 0x10, 0x1ff, 0x3) kexec_load(0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x121800) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000080)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 753.884409][ T4480] FAULT_INJECTION: forcing a failure. [ 753.884409][ T4480] name failslab, interval 1, probability 0, space 0, times 0 [ 753.955856][ T4480] CPU: 0 PID: 4480 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 753.965030][ T4480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.975108][ T4480] Call Trace: [ 753.978441][ T4480] dump_stack+0x172/0x1f0 [ 753.982796][ T4480] should_fail.cold+0xa/0x15 [ 753.987446][ T4480] ? fault_create_debugfs_attr+0x180/0x180 [ 753.993275][ T4480] ? ___might_sleep+0x163/0x280 [ 753.998151][ T4480] __should_failslab+0x121/0x190 [ 754.003199][ T4480] should_failslab+0x9/0x14 [ 754.007717][ T4480] kmem_cache_alloc_node_trace+0x274/0x750 [ 754.013531][ T4480] __kmalloc_node+0x3d/0x70 [ 754.018052][ T4480] kvmalloc_node+0x68/0x100 [ 754.022659][ T4480] vhost_dev_ioctl+0x206/0xda0 [ 754.027436][ T4480] ? lock_downgrade+0x920/0x920 [ 754.032302][ T4480] ? lockdep_hardirqs_on+0x418/0x5d0 [ 754.037619][ T4480] ? vhost_dev_set_owner+0xa20/0xa20 [ 754.042926][ T4480] ? tomoyo_path_number_perm+0x459/0x520 [ 754.048665][ T4480] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 754.053987][ T4480] ? vhost_vsock_flush+0xc0/0xc0 [ 754.058953][ T4480] ? vhost_vsock_flush+0xc0/0xc0 [ 754.063905][ T4480] do_vfs_ioctl+0xdb6/0x13e0 [ 754.068517][ T4480] ? ioctl_preallocate+0x210/0x210 [ 754.073641][ T4480] ? __fget+0x384/0x560 [ 754.077841][ T4480] ? ksys_dup3+0x3e0/0x3e0 [ 754.082267][ T4480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.088608][ T4480] ? fput_many+0x12c/0x1a0 [ 754.093052][ T4480] ? tomoyo_file_ioctl+0x23/0x30 [ 754.098185][ T4480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.104421][ T4480] ? security_file_ioctl+0x8d/0xc0 [ 754.104458][ T4480] ksys_ioctl+0xab/0xd0 [ 754.104475][ T4480] __x64_sys_ioctl+0x73/0xb0 [ 754.104495][ T4480] do_syscall_64+0xfd/0x6a0 [ 754.122839][ T4480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.128765][ T4480] RIP: 0033:0x4592c9 [ 754.132702][ T4480] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x2000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x51000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x10003, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0xffffffffffffff01, r1}) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000280)=0x2, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200602, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080)="c841b866b49abdfdc86bfc216dfa60be2bfb028833bbec0c724e4128f9a17e179a8c27b419637c2559d9c855c45d2da73fab9b08666e7b9d7cd0ed77af8d620222", &(0x7f0000000100)=""/168}, 0x18) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x52000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x3f, 0x20}, 0xc) kexec_load(0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000180)=""/122) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 754.152323][ T4480] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 754.160762][ T4480] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 754.168767][ T4480] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 754.176760][ T4480] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 754.184845][ T4480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 754.192830][ T4480] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:29 executing program 5 (fault-call:2 fault-nth:3): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:29 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r1 = shmget(0x2, 0x4000, 0x78000000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000000)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 12:38:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) 12:38:29 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x200, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x80000000) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x53000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 754.531122][ T4520] FAULT_INJECTION: forcing a failure. [ 754.531122][ T4520] name failslab, interval 1, probability 0, space 0, times 0 [ 754.591764][ T4520] CPU: 1 PID: 4520 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 754.600854][ T4520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.610925][ T4520] Call Trace: [ 754.614246][ T4520] dump_stack+0x172/0x1f0 [ 754.618628][ T4520] should_fail.cold+0xa/0x15 [ 754.623250][ T4520] ? fault_create_debugfs_attr+0x180/0x180 [ 754.629349][ T4520] ? ___might_sleep+0x163/0x280 [ 754.634229][ T4520] __should_failslab+0x121/0x190 [ 754.639185][ T4520] should_failslab+0x9/0x14 [ 754.643715][ T4520] kmem_cache_alloc_node_trace+0x274/0x750 [ 754.649551][ T4520] __kmalloc_node+0x3d/0x70 [ 754.654081][ T4520] kvmalloc_node+0x68/0x100 [ 754.658600][ T4520] vhost_dev_ioctl+0x206/0xda0 [ 754.663381][ T4520] ? lock_downgrade+0x920/0x920 [ 754.668242][ T4520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 754.673545][ T4520] ? vhost_dev_set_owner+0xa20/0xa20 [ 754.678841][ T4520] ? tomoyo_path_number_perm+0x459/0x520 [ 754.684501][ T4520] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 754.689892][ T4520] ? vhost_vsock_flush+0xc0/0xc0 [ 754.694854][ T4520] ? vhost_vsock_flush+0xc0/0xc0 [ 754.699808][ T4520] do_vfs_ioctl+0xdb6/0x13e0 [ 754.704427][ T4520] ? ioctl_preallocate+0x210/0x210 [ 754.709561][ T4520] ? __fget+0x384/0x560 [ 754.713740][ T4520] ? ksys_dup3+0x3e0/0x3e0 [ 754.718176][ T4520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.724431][ T4520] ? fput_many+0x12c/0x1a0 [ 754.728866][ T4520] ? tomoyo_file_ioctl+0x23/0x30 [ 754.733821][ T4520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.740081][ T4520] ? security_file_ioctl+0x8d/0xc0 [ 754.745455][ T4520] ksys_ioctl+0xab/0xd0 [ 754.745472][ T4520] __x64_sys_ioctl+0x73/0xb0 [ 754.745488][ T4520] do_syscall_64+0xfd/0x6a0 [ 754.745505][ T4520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.745515][ T4520] RIP: 0033:0x4592c9 [ 754.745531][ T4520] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:29 executing program 1: r0 = accept$netrom(0xffffffffffffffff, &(0x7f00000010c0)={{0x3, @netrom}, [@default, @netrom, @netrom, @null, @bcast, @remote, @default, @rose]}, &(0x7f0000001140)=0x48) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000001280)=0x5, &(0x7f00000012c0)=0x4) name_to_handle_at(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1008, 0x3, "94fc1052e44e2b3af98d395ac38aab86b43c22a77a5026a9c1ab8913725a41bc4a735b49ffb892a326eb469912f956cd35a18d74f02977138324c229b1d94f65425479cc6bca08e9ca1c62c38bf90aab3dbc0b8731279e26d379621afa5c487edf9b94d6a8e67a754627e01f6a88e9c65fa3baef350bbb98218f2912cfa3641298d0d95e29893fad0bf3601a11c52f752802c56dcc4efd6439f62a431422d3e183fa57ae67383222efcd54518f366f1fb7995e14d98e676d317c50b8458e7350cbade0455ebf2b3dda662e4ba5d5a54439472dca1333ffffd6d83547d9d4a2ceb0d441046e4ffc382e1e7c12d8b9d24ec393b72196f9a2bb2bfcdb65b3ac1f91ae4c2bd2c3f30465c51f659e77b50efe67c9509542092f954ee3be4757a2816af6b399f43d18ad21b88afcbc1bcc77d6ff10a5802701bfbd003fb14d2557fcad08a661bc85eda4d6a353ddef77889808fd445b0188750a296cec79d2b13cd7e12b2e8c0ceeb6fcf27eaf831bd54906481467a30013087b61d1c91e90d900140b6d8ae57b46f4e97a75a7dfd3a670e13a44931c768d208eeddada19cd0f4b1d39d0d3c9fd7f0d961a0e0e60b6c2f7c08f665ae7386f37645e3733d4944d2455db2542fccf8546d246b6c7f199e5c8371fa08004e53f67331bf9d8890ff1a5a66a0638be7270ceb333884ba4283d0a52145783795ad5b1ae380a41bc956d4899a0abbebb226d54976c697dfe321a591b5539ad8fd2a3c84af52d7dc73616c23e3d0f4535668201bfd8121a4bdc2c687921dae6a83e6512e35e49ffcd6ff35addfc4ebdedcc48a6b8bb20cd059783343d89d16f37fa8b00c8df88006d65c8f3b22c050e963f50b3af03b6a6463d5c5dc28b1e4dd5075d145fbd9d08c2f575170651bb70b1a3b9a6aba24c1863308a30ce4aadfbfed6a5bd076d9e37d091adf5d6248fbe608741950a58093c9ea4c619f75af6dc5bfa241d34699370295b120a769f2afb318f1feaadaa8518533f1d36eab57ee03131db41def4d6dfd9c03d49dad0f079de2e6e7e153e0e59f29ad5201acf6ccca68bc16e33ec2ab38eb94a11ebd60faf31e19307d49e065f934bcbdd68503a09d294b0d5c2c9e8b93643c08ea9e7021af2ed92cf06255b5cc96d0bbb0778853c104899810096b1486125b0cf362af61ceb168e624b127dc511a629c5a8a08f05de83c5eb61e4b8fc33b943a3c5ecd5fd42fbed8f668dffee9fe51bd7f11af656a3d8487f49fee674ee9ee0dec7b93eb842131f0a3618489ac5ddc2eded056161f1d8a57963ace1fe65898887ddd6f00fb784c34994abc07c27481a45fdd368eac0e9fc4bbe7645830e4fe09dfb228983e849b02110b218178cfea419538b07cefc44989a4b7e74a4a82d403142583f645b7826c5bb549cb5b37f311e831f640cf06b4efc6bef19282701e6f25aeba236ca2599578841fb8a6951b00aa05230f6e8a118f7660bd2daf3e07020b98d9236d958db831b7890d9531b0bf7ad4a6707ff3255c5eafffde46cba12b1260eb144af80174cb589e155709f2f03e38eae6f76c0c83d9a5554395a7feec266535f4a274cd85d57ca62b62e4e125ff8ff9965d0e5c43884930bc624b5a7591401602bbc25d908585b1832511a0759ffa1a0e7f7a82603687f181509b8389fe93bc24e2d3a7f5d358479e795e9bdc610af45280a43858c291cab2ee2ef3bcc7203e1fe2a109cac4e751d8bc16baca3281a705e8a455e10dfaebbdb0d0116aa6a0efcb971b5eb443c9896d7d5335d0e7bf0543e3a00362e325a8b6d466174084313ddc59332015955752bb7ccee1bdd4d50c7fe31ef43cdc11cb224e67c5c27aacb4d6186078bc5a2ec23251910175bd6386ec468b599b978f1586a9a9065e6c79ec446356db06b04f959f07f41db2c8192da57cf70ef4a39e03c700ebbb11ad9f23ee0510ac89cdba0b4e784265c5613a15d32dfd8219a27408499faeedcbc46fa198c5362b4ca5ee0f0d5332f70afd2993e707455a7da9e09a37a5702e93e84f6bd8bfd860a7115e64429bb327ee03f7841a1d2f325e042ed80ada0d98d83b2e6ac8823f7d3eb19280b4b13fdc62de6685984d67290e5ab35ea0b2aa149745c67d3b372a9509429274880b9cfef04b0cb70ed92162f4ef01e97fc605dba3be56c000bc3fe4acad9f2d6b3b560a672dcabfe9eae907dc0cf9af93a07ad8b1700d6d3af48e2105380da333e238a95afb2b29a49a61ea2d7441691cc535a425ab3159cc93d8f7a550d14a70ce9cbafe9052baab5b2846a1c5a1e2281f26534351723c9a57d69c7778c346ba6c1bfc5526c0ae9268169012ea8ad7ba8c8f54715e4a5d8368bba5c3d12b819d7b406e68a07ae0118bea9289fca5cc55c9045e196bd83ddedf18ca25d637f5e141a8705cdcc3266344cc5c3a5c6691f9fa9aaf4e5349fc369eeab517daaa4a4affbb33986824c4b7d6de830577f25ef2f00bb57db2e479315aab07ae941c4683b2531fb4916fc4fca5c98acb914413d5139f16ed840731a9e27117464d369052de61e24caeb2b940a4e498a74e78520b8a2f12d1875bda928ae4b3dcc35ec26baa6b450b43271355df5a6f3f0013bb54040393500bdae6b0bff9163de6fdbed66ffb068be4a0754d7ca74bdacb09982ee6d5ed3f2fce3f13ee7b3ddc09286d6ee6f0e438285de22fa94c03689933e5951221de6701db96c702e0d2fa31bcbd395b9df501d4d526a40eb2474d42f6b22b3671aecad28cbf437866f142d99244c449d6b72622998daad5ee0d7db3da0f06dcfcba1dfc00b12b73e15629e467b51a4c60500078691d1a341104579bd2f3e9f9dd77080819cd89fdf22b28e386ffb225f706a29746db7086b518a19f2e53ec03d0f6f7f40d4884c506709c29f596bf983b7d2ae518115ed924df1b7525417a50674a1d6b198b3b8012134a49cf3d033b6681e1481ce42809b3f31e90220f8515bf028ad1c0525a706453b1d1849bc6f102f3de6cb2e9cfd222ee053fd06d84ec4baec4d2b4a1317d5153f979f864c374f14d1af9dfa819fcf6473ac5b8bc1dd9cfa254358598e6adda514b663c77c7cdcb8cc9922b803128fd0e573baac9826effb390433ea1ca8d0667a82e9d7770c7f1603f2d9d280a6bbf08b6f4bbba53eaad2a18986f33e571726586310a946b12c951e0de9aa31942040440a4cc22319990d1be5ad5ec85c5e9e4d5831d606f3a58362772e83b5974808c27deafdcc8b68400728ac525aa8940dafed9951f9594743dd3cb2a608d512130cd02cbff814a3789c064e15ea0399e4cb9c5cf603125940fa2423fc1520a13179b4c98b22d0ef0d434d5b15e4ed30152872ad6a5b1e82573a3faa6bcf8140b3fe4f5e559bf5617f087d59e6ccc30e9792b3bd0233be6ce885d778c05462605f89261cc03fef297c2d466d472330ea0d31a99981466792edaf58b58eb68310d09516f21907bdb612b88a478dc402a4f2af544ea71298d758ba830b88c2e61c8d122a1b6bc5e46a5209ffd6ca11675a98b11ef521aa144ded542668a8eed2184dafeca26afa68cf13053cc7551a60a24fe45fd62057dcf8ea2b6937189fb481d2727dc3538a6d0d91318a4223ba3c065c355ba1364269f6daa331c18700b9896ce9ec8e89bec824e9229e47c55d47ea75b2534c7d63bf1aa47f22981fb82c13de5d88cb9a95a1eac9c07cc0fc9bf54353c0b124c4ae82415936b8ba131d503fbb2f1a57eb2b992df2d77a1332b820e84a769da8ca4f1eac342d5aff6fd45e11ff4ee407d4a83a330dbf36702b7856849503251aedf4f6584791ae15b0c8be6f1bf633c991d3a257bb9bcc5dda36bdc94bedad5fae8818ecf4f884b8e38be6308445ac5b26f6d752c4a5e5ce1f9f98fc5b24b2b168a314f93c02a7fa576ae1ccce450ca9b6ff460f7231ad80f612cb782c0412b31ee7d7219bac27f4ca67a93087c39e0b6e4746d832ee5f5454c06f1afb555c543b5f098410830b5dc3ca752d92cb81174775ec3c97642925ffde17dfe1d0fa96d43aea5d43f70c4879597d882e7fff157097fdcc368a2d80607c16ca61378e5fd18d3b244c40efff7693e4fd05d1aaaff04f16c24982e20b15bbb25eeea9c86c504472dd0b2e89201c08cb33f51aa25ca1dff397493b7b6fe9726d42dc9caadb0be7017b2e32e232854c1988fd4acdb13cbde3039b95ecc3fa9ef9d4988da39e25b055f992fa45372d5b7671c79b4c03fba4ea97f572526b85a7997ec23802ae8fe562bfd79c1ea5238100f885824172f157cc91268370ef1d8854eefd77df8eef1e9134bfcbe63b367a239b0d43f62bbbdb9de9d926f3b5b8cc0c9bdfdc11461e061f9e92b6f9e7173adcfc2d2670c71920ca5c8e1059d66f2b240ddeb0c1a3c15bc2da90becdd213d2f7658fcd7264913d0afe637fbe6162d9fccd6d8d551f6c4d90e7f8a0c2451f14fee93ddffbe2ea3f9acc56d78312b9b29a40336173e1f15a46f1657b44690cce441f48db37512a19695b00a9754e7d64f240e6486720c060fa98176bd39b2715864ca065674471acd2ca3baaf2dece7a906d48af6f925fbeff3d3a544fffe14bddb403b3e58fc9bfdd47d00c0d78f04d44c0e7654316521a511ec44f71c23fe4b999cda740d656ca18707e0e0c4a1e790596fcab9c2e67e7af1322d49821b7dcf870e43141706192764ccf8b28c172f4436f89bba3a5b4d3c891e25eded7409ffd90e08c37383cf559e34478841987af363721dfd7d96a2e19065f350ab14050f7f353ea5a78a3086b350c3d3ec4e4de4a2469a181904b685ea5aa8b7389c90c0984900b99c467b326c2d557f416058f2ef93e99333641f3c4aa50613446dc2fdf2d0cb578ba57de96de568fa0444823ae25ef42710b8c1577ac520cf2efa8fbec20bfe55ed7b8be2d302244ec34183edfe8832ec439d2acd11f0a2aa96972b278963ff35f5fe2768148c01c6065bb93a9cb5dcb1f36d43c9ce9765a2c2980bb8039db8ac2e4f645b19a5940be5a34ad27953578824bbd574546a261419296370103e1c95cd9ec4aea4ba80e9793bfb0b090fe87cf6721b78b084615c3551ce8650a0ad5be9e499f6abd0435c9647eda1dc0c9e23bc71d9eb5317f621da79a88a7bcb96252c83136bf3f89d025283a943ef56b32794a96343c2a00f379753e087a586760cd3c6ce95238cc9d402b56d5a7e960a251b7cb8652b978cf3e0c51e28b5b20af604d570b5052baaa37a372013dbddecd5839151ab8269d2361b31740883df361a702489613da2c116d55c8a5c959ad1505cb2548a525d0e48a0c4916281dc77f10ae796c7927f68e3d631b0df3acf7b2d550ba2967e7c304866c34ffb2f1a7941c4a4f3d979c93eba9aa8e72fb678243ab8344f0dec8062ddce670bbf9c7fb9dbdf4f7902280f195400f0c27a54ab2505cbb98eb8824a0f80e78de9c64b343e3179826fefe5c15548db3a260a94c704eec11b89abe2f0c75f709483774eb6709b99191360e343f8cad3b219f1ea4675691b9b0e14ae11422f1dc0432042226aca3dadc0d810cb529b4eb69817804130a058210347b3596ab7581cb5366887598da8ead246a9631fde8c6bb8819ad3bf788ca7c7012af88c55c78f36af490a83845fb428150c464dce746926164f2df75f1f36ba73cbe659f9a3761d229596547d96c7f4b0a7b7dc5fb909b781066b6fbb652a23d16c9892bd51992fb3aff61706c2c2f5007be766448cf90e225a13318a0a960c6eaeaa885db52a67a92bb4ce01b63417220000cf261f424"}, &(0x7f0000001080), 0x400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000001200)={0x3, &(0x7f0000001180)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}]}) 12:38:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x7605956}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 754.745538][ T4520] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 754.745551][ T4520] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 754.745558][ T4520] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 754.745565][ T4520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 754.745572][ T4520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 754.745586][ T4520] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x54000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 5 (fault-call:2 fault-nth:4): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9a3503f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 1: kexec_load(0x401, 0x1000002fc, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x1000000000000, 0x0) 12:38:30 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3e, 0x1) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:30 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) getpeername$ax25(r0, &(0x7f0000000180)={{}, [@null, @null, @netrom, @rose, @netrom, @bcast, @default, @netrom]}, &(0x7f0000000240)=0xb6b627196025d655) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x2800000, 0x7fffffff}, {0x10000, 0x5}], r2}, 0x18, 0x3) [ 755.277917][ T4571] FAULT_INJECTION: forcing a failure. [ 755.277917][ T4571] name failslab, interval 1, probability 0, space 0, times 0 [ 755.291767][ T4571] CPU: 1 PID: 4571 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 755.300820][ T4571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.310892][ T4571] Call Trace: [ 755.314338][ T4571] dump_stack+0x172/0x1f0 [ 755.318727][ T4571] should_fail.cold+0xa/0x15 [ 755.323345][ T4571] ? fault_create_debugfs_attr+0x180/0x180 [ 755.329182][ T4571] __should_failslab+0x121/0x190 [ 755.334139][ T4571] should_failslab+0x9/0x14 [ 755.338657][ T4571] kmem_cache_alloc_trace+0x4b/0x790 [ 755.343958][ T4571] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 755.349782][ T4571] vhost_new_umem_range+0x79/0x700 [ 755.354911][ T4571] vhost_dev_ioctl+0x37f/0xda0 [ 755.359710][ T4571] ? lock_downgrade+0x920/0x920 [ 755.364567][ T4571] ? lockdep_hardirqs_on+0x418/0x5d0 [ 755.369863][ T4571] ? vhost_dev_set_owner+0xa20/0xa20 12:38:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x800, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000040)='aio\x00', 0x1) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, r0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xb3fffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 755.375163][ T4571] ? tomoyo_path_number_perm+0x459/0x520 [ 755.380824][ T4571] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 755.386137][ T4571] ? vhost_vsock_flush+0xc0/0xc0 [ 755.391132][ T4571] ? vhost_vsock_flush+0xc0/0xc0 [ 755.396089][ T4571] do_vfs_ioctl+0xdb6/0x13e0 [ 755.400697][ T4571] ? ioctl_preallocate+0x210/0x210 [ 755.405812][ T4571] ? __fget+0x384/0x560 [ 755.409977][ T4571] ? ksys_dup3+0x3e0/0x3e0 [ 755.414405][ T4571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.420660][ T4571] ? fput_many+0x12c/0x1a0 [ 755.425094][ T4571] ? tomoyo_file_ioctl+0x23/0x30 [ 755.430051][ T4571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.436301][ T4571] ? security_file_ioctl+0x8d/0xc0 [ 755.441432][ T4571] ksys_ioctl+0xab/0xd0 [ 755.445952][ T4571] __x64_sys_ioctl+0x73/0xb0 [ 755.450560][ T4571] do_syscall_64+0xfd/0x6a0 [ 755.455080][ T4571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.460976][ T4571] RIP: 0033:0x4592c9 [ 755.464882][ T4571] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.484510][ T4571] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 755.492935][ T4571] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 755.500937][ T4571] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 755.508918][ T4571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 755.516902][ T4571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 12:38:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x55000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3f000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 755.524886][ T4571] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syzkaller1\x00', 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000100)="c046f944590d9748ec667fd8c5508870e782a87737e7e2a8c5581ca12b5344df3838505efcb4657fe98548bd3ddacc359701a3e58d9f0806a21607f42a4971bc7cdd0e3db1c3f616993e93ce8a499583d3681b7c48cd4b9c9710d3bc2210cb9ca0b9f3180e22049ae2e5d2dfdad89b21a6e4d58da25e4d4a78be10c8b1e926c6bca465f7a5ee576e662b5cdfc9570a334345133b5461bc8a6a60103a48ac190d4b150f6f37123a5b8fbb9347cb40021db19748937a4a95859b33d9baf4dd35f985b7ca4d", &(0x7f0000000200)=""/100}, 0x18) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) kexec_load(0x0, 0xffffffffffffff5f, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000a80)=0x0) process_vm_writev(r2, &(0x7f0000000900)=[{&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/155, 0x9b}, {&(0x7f0000000500)=""/191, 0xbf}, {&(0x7f00000005c0)=""/220, 0xdc}, {&(0x7f00000006c0)=""/124, 0x7c}, {&(0x7f0000000740)=""/180, 0xb4}, {&(0x7f0000000800)=""/251, 0xfb}], 0x8, &(0x7f0000000a40)=[{&(0x7f0000000980)=""/11, 0xb}, {&(0x7f00000009c0)=""/12, 0xc}, {&(0x7f0000000a00)=""/9, 0x9}], 0x3, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:30 executing program 5 (fault-call:2 fault-nth:5): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:30 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) io_getevents(r1, 0x8001, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)={0x77359400}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x10000000000) 12:38:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x56000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3f50a309}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x20000) [ 755.885940][ T4609] FAULT_INJECTION: forcing a failure. [ 755.885940][ T4609] name failslab, interval 1, probability 0, space 0, times 0 [ 755.937103][ T4609] CPU: 1 PID: 4609 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 755.946193][ T4609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.956260][ T4609] Call Trace: [ 755.959554][ T4609] dump_stack+0x172/0x1f0 [ 755.963922][ T4609] should_fail.cold+0xa/0x15 [ 755.968535][ T4609] ? fault_create_debugfs_attr+0x180/0x180 [ 755.974388][ T4609] __should_failslab+0x121/0x190 [ 755.979346][ T4609] should_failslab+0x9/0x14 [ 755.983858][ T4609] kmem_cache_alloc_trace+0x4b/0x790 [ 755.989162][ T4609] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 755.994992][ T4609] vhost_new_umem_range+0x79/0x700 [ 756.000129][ T4609] vhost_dev_ioctl+0x37f/0xda0 [ 756.004923][ T4609] ? lock_downgrade+0x920/0x920 [ 756.009793][ T4609] ? lockdep_hardirqs_on+0x418/0x5d0 [ 756.015190][ T4609] ? vhost_dev_set_owner+0xa20/0xa20 [ 756.020490][ T4609] ? tomoyo_path_number_perm+0x459/0x520 [ 756.026158][ T4609] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 756.031552][ T4609] ? vhost_vsock_flush+0xc0/0xc0 12:38:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x3e0000) ioctl(r0, 0x9, &(0x7f0000000040)="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") syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 756.036613][ T4609] ? vhost_vsock_flush+0xc0/0xc0 [ 756.041572][ T4609] do_vfs_ioctl+0xdb6/0x13e0 [ 756.046178][ T4609] ? ioctl_preallocate+0x210/0x210 [ 756.051355][ T4609] ? __fget+0x384/0x560 [ 756.055529][ T4609] ? ksys_dup3+0x3e0/0x3e0 [ 756.059956][ T4609] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 756.066197][ T4609] ? fput_many+0x12c/0x1a0 [ 756.070627][ T4609] ? tomoyo_file_ioctl+0x23/0x30 [ 756.075571][ T4609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.081825][ T4609] ? security_file_ioctl+0x8d/0xc0 12:38:31 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0x752}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x57000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 756.086969][ T4609] ksys_ioctl+0xab/0xd0 [ 756.091140][ T4609] __x64_sys_ioctl+0x73/0xb0 [ 756.095730][ T4609] do_syscall_64+0xfd/0x6a0 [ 756.095749][ T4609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.095762][ T4609] RIP: 0033:0x4592c9 [ 756.095777][ T4609] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.095790][ T4609] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:38:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 756.129748][ T4609] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 756.129758][ T4609] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 756.129767][ T4609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 756.129776][ T4609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 756.129784][ T4609] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x40000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:31 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40282, 0x0) 12:38:31 executing program 5 (fault-call:2 fault-nth:6): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x58000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) getsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f00000000c0)={r0, r1, 0xffff}) 12:38:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x56596007}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:31 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) fsetxattr(r0, &(0x7f00000001c0)=@random={'os2.', '/proc/capi/capi20\x00'}, &(0x7f0000000200)='security.', 0x9, 0x2) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x14060000, 0x60000) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x600, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'security.', '\x00'}, &(0x7f0000000040)=""/170, 0xaa) fcntl$dupfd(r2, 0x0, r2) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0xfffffffffffffe7c, 0x0, 0x3e0000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) memfd_create(&(0x7f0000000040)='\x00', 0x5) [ 756.613213][ T4654] FAULT_INJECTION: forcing a failure. [ 756.613213][ T4654] name failslab, interval 1, probability 0, space 0, times 0 [ 756.676824][ T4654] CPU: 1 PID: 4654 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 756.685909][ T4654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.696068][ T4654] Call Trace: [ 756.699388][ T4654] dump_stack+0x172/0x1f0 [ 756.703838][ T4654] should_fail.cold+0xa/0x15 [ 756.708449][ T4654] ? fault_create_debugfs_attr+0x180/0x180 [ 756.714291][ T4654] __should_failslab+0x121/0x190 [ 756.719252][ T4654] should_failslab+0x9/0x14 [ 756.723771][ T4654] kmem_cache_alloc_trace+0x4b/0x790 [ 756.729072][ T4654] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 756.734897][ T4654] vhost_new_umem_range+0x79/0x700 [ 756.740040][ T4654] vhost_dev_ioctl+0x37f/0xda0 [ 756.744819][ T4654] ? lock_downgrade+0x920/0x920 [ 756.749706][ T4654] ? lockdep_hardirqs_on+0x418/0x5d0 [ 756.755020][ T4654] ? vhost_dev_set_owner+0xa20/0xa20 [ 756.760322][ T4654] ? tomoyo_path_number_perm+0x459/0x520 [ 756.765983][ T4654] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 756.771286][ T4654] ? vhost_vsock_flush+0xc0/0xc0 12:38:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x59000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x7fe0bffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 756.776240][ T4654] ? vhost_vsock_flush+0xc0/0xc0 [ 756.781201][ T4654] do_vfs_ioctl+0xdb6/0x13e0 [ 756.785826][ T4654] ? ioctl_preallocate+0x210/0x210 [ 756.790944][ T4654] ? __fget+0x384/0x560 [ 756.795124][ T4654] ? ksys_dup3+0x3e0/0x3e0 [ 756.799646][ T4654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 756.805899][ T4654] ? fput_many+0x12c/0x1a0 [ 756.810334][ T4654] ? tomoyo_file_ioctl+0x23/0x30 [ 756.815290][ T4654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.821549][ T4654] ? security_file_ioctl+0x8d/0xc0 [ 756.826683][ T4654] ksys_ioctl+0xab/0xd0 [ 756.830861][ T4654] __x64_sys_ioctl+0x73/0xb0 [ 756.835468][ T4654] do_syscall_64+0xfd/0x6a0 [ 756.839980][ T4654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.845864][ T4654] RIP: 0033:0x4592c9 [ 756.845879][ T4654] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 756.845885][ T4654] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 756.845898][ T4654] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 756.845907][ T4654] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 756.845914][ T4654] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 756.845922][ T4654] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 756.845930][ T4654] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:32 executing program 5 (fault-call:2 fault-nth:7): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/56) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400380) 12:38:32 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x4040) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x4, 0x4) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x7ff0bffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:32 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x8, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 12:38:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9047b000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0xae080) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000080)={0x0, @frame_sync}) kexec_load(0x4, 0x322, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xb, 0x40030, r0, 0x0) 12:38:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xda000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 757.328968][ T4697] FAULT_INJECTION: forcing a failure. [ 757.328968][ T4697] name failslab, interval 1, probability 0, space 0, times 0 [ 757.420782][ T4697] CPU: 1 PID: 4697 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 757.429966][ T4697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.440037][ T4697] Call Trace: [ 757.443352][ T4697] dump_stack+0x172/0x1f0 [ 757.447707][ T4697] should_fail.cold+0xa/0x15 [ 757.452324][ T4697] ? fault_create_debugfs_attr+0x180/0x180 [ 757.458157][ T4697] __should_failslab+0x121/0x190 [ 757.463119][ T4697] should_failslab+0x9/0x14 [ 757.467639][ T4697] kmem_cache_alloc_trace+0x4b/0x790 [ 757.472939][ T4697] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 757.478774][ T4697] vhost_new_umem_range+0x79/0x700 [ 757.483911][ T4697] vhost_dev_ioctl+0x37f/0xda0 [ 757.488686][ T4697] ? lock_downgrade+0x920/0x920 [ 757.493571][ T4697] ? lockdep_hardirqs_on+0x418/0x5d0 [ 757.498868][ T4697] ? vhost_dev_set_owner+0xa20/0xa20 [ 757.504158][ T4697] ? tomoyo_path_number_perm+0x459/0x520 [ 757.509816][ T4697] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 757.515120][ T4697] ? vhost_vsock_flush+0xc0/0xc0 12:38:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 757.520071][ T4697] ? vhost_vsock_flush+0xc0/0xc0 [ 757.525032][ T4697] do_vfs_ioctl+0xdb6/0x13e0 [ 757.529643][ T4697] ? ioctl_preallocate+0x210/0x210 [ 757.534763][ T4697] ? __fget+0x384/0x560 [ 757.538934][ T4697] ? ksys_dup3+0x3e0/0x3e0 [ 757.543366][ T4697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 757.549612][ T4697] ? fput_many+0x12c/0x1a0 [ 757.554051][ T4697] ? tomoyo_file_ioctl+0x23/0x30 [ 757.558995][ T4697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.565253][ T4697] ? security_file_ioctl+0x8d/0xc0 [ 757.570380][ T4697] ksys_ioctl+0xab/0xd0 [ 757.574556][ T4697] __x64_sys_ioctl+0x73/0xb0 [ 757.579158][ T4697] do_syscall_64+0xfd/0x6a0 [ 757.583681][ T4697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.589578][ T4697] RIP: 0033:0x4592c9 [ 757.593478][ T4697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.613091][ T4697] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:38:32 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x60000, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0xa68400}, 0xc) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) [ 757.621516][ T4697] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 757.629499][ T4697] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 757.637479][ T4697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 757.645460][ T4697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 757.653437][ T4697] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:33 executing program 5 (fault-call:2 fault-nth:8): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9047c000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) kexec_load(0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x44000, 0x0) getpeername$netrom(r0, &(0x7f00000002c0)={{}, [@netrom, @bcast, @null, @default, @null, @null, @rose, @null]}, &(0x7f0000000340)=0x48) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x100, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x6}, 0x28, 0x1) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000100)) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000240)=0x7) write$P9_RRENAME(r2, &(0x7f0000000140)={0x7, 0x15, 0x2}, 0x7) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) r3 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="97de81e61ae325524d22e2f400006b704ae29621", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e21, 0x798000, @loopback, 0x1}}}, &(0x7f00000004c0)=0x84) 12:38:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9618b000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x10000) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f00000001c0), &(0x7f0000000180)=0x18c) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3a, 0x100) 12:38:33 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000080)={0x0, 0x0, @stop_pts=0x6}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 758.121060][ T4742] FAULT_INJECTION: forcing a failure. [ 758.121060][ T4742] name failslab, interval 1, probability 0, space 0, times 0 [ 758.203252][ T4742] CPU: 0 PID: 4742 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 758.212440][ T4742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.222554][ T4742] Call Trace: [ 758.225869][ T4742] dump_stack+0x172/0x1f0 [ 758.230217][ T4742] should_fail.cold+0xa/0x15 [ 758.234818][ T4742] ? fault_create_debugfs_attr+0x180/0x180 [ 758.240647][ T4742] __should_failslab+0x121/0x190 [ 758.245601][ T4742] should_failslab+0x9/0x14 [ 758.250114][ T4742] kmem_cache_alloc_trace+0x4b/0x790 [ 758.255423][ T4742] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 758.261253][ T4742] vhost_new_umem_range+0x79/0x700 [ 758.266393][ T4742] vhost_dev_ioctl+0x37f/0xda0 [ 758.271169][ T4742] ? lock_downgrade+0x920/0x920 [ 758.276032][ T4742] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.281337][ T4742] ? vhost_dev_set_owner+0xa20/0xa20 [ 758.286639][ T4742] ? tomoyo_path_number_perm+0x459/0x520 [ 758.292302][ T4742] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 758.297612][ T4742] ? vhost_vsock_flush+0xc0/0xc0 [ 758.302656][ T4742] ? vhost_vsock_flush+0xc0/0xc0 [ 758.307603][ T4742] do_vfs_ioctl+0xdb6/0x13e0 [ 758.312208][ T4742] ? ioctl_preallocate+0x210/0x210 [ 758.317340][ T4742] ? __fget+0x384/0x560 [ 758.321524][ T4742] ? ksys_dup3+0x3e0/0x3e0 [ 758.325971][ T4742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.332225][ T4742] ? fput_many+0x12c/0x1a0 [ 758.336659][ T4742] ? tomoyo_file_ioctl+0x23/0x30 [ 758.341618][ T4742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.348085][ T4742] ? security_file_ioctl+0x8d/0xc0 12:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000001c0)={r1, &(0x7f0000000140)=""/110}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000040)=0x1) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000200)={0x1, 0xfff}) 12:38:33 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@newtfilter={0x34, 0x2c, 0x800, 0x70bd2a, 0x25dfdbff, {0x0, r1, {0xf, 0xf}, {0xfffa}, {0x0, 0xb}}, [@TCA_RATE={0x8, 0x5, {0x9, 0xff}}, @TCA_CHAIN={0x8, 0xb, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8004) [ 758.353217][ T4742] ksys_ioctl+0xab/0xd0 [ 758.357516][ T4742] __x64_sys_ioctl+0x73/0xb0 [ 758.362119][ T4742] do_syscall_64+0xfd/0x6a0 [ 758.366718][ T4742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.372698][ T4742] RIP: 0033:0x4592c9 [ 758.376594][ T4742] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.396272][ T4742] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.396288][ T4742] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 758.396295][ T4742] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 758.396302][ T4742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.396309][ T4742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 758.396316][ T4742] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:33 executing program 5 (fault-call:2 fault-nth:9): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xde000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9618c000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0xffffff85, 0x0, 0x80000000) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 1: kexec_load(0xc, 0x0, 0x0, 0x80002) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 1: kexec_load(0x5, 0xfffffffffffffe5d, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) flistxattr(r0, &(0x7f0000000080)=""/4096, 0x1000) write$FUSE_BMAP(r0, &(0x7f00000010c0)={0x18, 0xfffffffffffffff5, 0x1, {0x6}}, 0x18) openat$null(0xffffffffffffff9c, &(0x7f0000001080)='/dev/null\x00', 0x2080, 0x0) 12:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa0008000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) timer_create(0x2, &(0x7f0000000140)={0x0, 0x5, 0x4, @thr={&(0x7f0000000040)="451afe9ead842c888bd90bbd43e04aa1c9e970bfda85ae667dbd23af98ea9d125552941782f669892d0ea8103974ab5014f601e2bdc7b12059d80218bff9b8e14c61c5a0cff988c8ae53c689d9a4dbbfc17e10e63c5842a98001acc4f37512ac35dd9cac4bed7f60ea932becf4d720c309a8a12b937f7cacd9f6dbe4db5c25870f9e49ce08f7d1bf26860a34fa6960b4436007300605669e0cb6e1cd28eab3530ba9cc5f53", &(0x7f0000000100)="bb7339a80900d8bf4b142c158d6948002ba40761554941f6ce7d9d532eb51a4d2979d08baab8f518f6f80b2a8fd2aefd814ddb"}}, &(0x7f0000000180)=0x0) timer_getoverrun(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x280}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r3, 0x908, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc040}, 0x40000) [ 758.741940][ T4784] FAULT_INJECTION: forcing a failure. [ 758.741940][ T4784] name failslab, interval 1, probability 0, space 0, times 0 [ 758.840866][ T4784] CPU: 0 PID: 4784 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 758.849963][ T4784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.860037][ T4784] Call Trace: [ 758.863364][ T4784] dump_stack+0x172/0x1f0 [ 758.867723][ T4784] should_fail.cold+0xa/0x15 [ 758.872346][ T4784] ? fault_create_debugfs_attr+0x180/0x180 [ 758.878183][ T4784] __should_failslab+0x121/0x190 [ 758.883148][ T4784] should_failslab+0x9/0x14 [ 758.887674][ T4784] kmem_cache_alloc_trace+0x4b/0x790 [ 758.897549][ T4784] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 758.903476][ T4784] vhost_new_umem_range+0x79/0x700 [ 758.908624][ T4784] vhost_dev_ioctl+0x37f/0xda0 [ 758.913413][ T4784] ? lock_downgrade+0x920/0x920 [ 758.918280][ T4784] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.923593][ T4784] ? vhost_dev_set_owner+0xa20/0xa20 [ 758.929078][ T4784] ? tomoyo_path_number_perm+0x459/0x520 [ 758.934742][ T4784] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 758.940050][ T4784] ? vhost_vsock_flush+0xc0/0xc0 [ 758.945019][ T4784] ? vhost_vsock_flush+0xc0/0xc0 [ 758.949975][ T4784] do_vfs_ioctl+0xdb6/0x13e0 [ 758.954617][ T4784] ? ioctl_preallocate+0x210/0x210 [ 758.959754][ T4784] ? __fget+0x384/0x560 [ 758.963938][ T4784] ? ksys_dup3+0x3e0/0x3e0 [ 758.968369][ T4784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.974702][ T4784] ? fput_many+0x12c/0x1a0 [ 758.979176][ T4784] ? tomoyo_file_ioctl+0x23/0x30 [ 758.984218][ T4784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.990474][ T4784] ? security_file_ioctl+0x8d/0xc0 [ 758.995694][ T4784] ksys_ioctl+0xab/0xd0 [ 758.999972][ T4784] __x64_sys_ioctl+0x73/0xb0 [ 759.004577][ T4784] do_syscall_64+0xfd/0x6a0 [ 759.009185][ T4784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.015104][ T4784] RIP: 0033:0x4592c9 [ 759.019144][ T4784] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa0670c00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 759.039289][ T4784] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 759.047830][ T4784] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 759.056175][ T4784] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 759.064300][ T4784] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.064314][ T4784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 759.064321][ T4784] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:34 executing program 5 (fault-call:2 fault-nth:10): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa274f000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0x0, 0x8000}) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f00000000c0)={@initdev, @rand_addr, @local}, &(0x7f0000000100)=0xc) 12:38:34 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x5, 0x9}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x800, 0x6, 0x5, 0x6}, &(0x7f0000000180)=0x14) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r2, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xba}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4800) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0xe78, 0x3) 12:38:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x60000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:34 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x800) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="298e000003000000000000000000000003000000000000000800000000000000422d6d643573756d00"], 0x29) 12:38:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa2750000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x73, 0x400) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0x1d, @broadcast, 0x4e22, 0x4, 'wrr\x00', 0x20, 0x12000000000000, 0x20}, {@broadcast, 0x4e24, 0x0, 0x800, 0x7, 0xf4b4}}, 0x44) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) write$P9_RLERRORu(r0, &(0x7f0000000100)={0x11, 0x7, 0x1, {{0x4, 'bdev'}, 0x5}}, 0x11) write$P9_RLERROR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="09000013e39981dcfc097f0000000000"], 0x9) [ 759.397405][ T4824] FAULT_INJECTION: forcing a failure. [ 759.397405][ T4824] name failslab, interval 1, probability 0, space 0, times 0 [ 759.475510][ T4824] CPU: 0 PID: 4824 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 759.484604][ T4824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.494767][ T4824] Call Trace: [ 759.498091][ T4824] dump_stack+0x172/0x1f0 [ 759.502449][ T4824] should_fail.cold+0xa/0x15 [ 759.507208][ T4824] ? fault_create_debugfs_attr+0x180/0x180 [ 759.513051][ T4824] __should_failslab+0x121/0x190 [ 759.518010][ T4824] should_failslab+0x9/0x14 [ 759.522535][ T4824] kmem_cache_alloc_trace+0x4b/0x790 [ 759.527856][ T4824] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 759.533697][ T4824] vhost_new_umem_range+0x79/0x700 [ 759.538851][ T4824] vhost_dev_ioctl+0x37f/0xda0 [ 759.543625][ T4824] ? lock_downgrade+0x920/0x920 [ 759.548491][ T4824] ? lockdep_hardirqs_on+0x418/0x5d0 [ 759.554234][ T4824] ? vhost_dev_set_owner+0xa20/0xa20 [ 759.559540][ T4824] ? tomoyo_path_number_perm+0x459/0x520 [ 759.565216][ T4824] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 759.570703][ T4824] ? vhost_vsock_flush+0xc0/0xc0 [ 759.575685][ T4824] ? vhost_vsock_flush+0xc0/0xc0 [ 759.580647][ T4824] do_vfs_ioctl+0xdb6/0x13e0 [ 759.585274][ T4824] ? ioctl_preallocate+0x210/0x210 [ 759.590436][ T4824] ? __fget+0x384/0x560 [ 759.594629][ T4824] ? ksys_dup3+0x3e0/0x3e0 [ 759.599068][ T4824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.605348][ T4824] ? fput_many+0x12c/0x1a0 [ 759.609778][ T4824] ? tomoyo_file_ioctl+0x23/0x30 [ 759.614710][ T4824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.614726][ T4824] ? security_file_ioctl+0x8d/0xc0 [ 759.614744][ T4824] ksys_ioctl+0xab/0xd0 [ 759.614762][ T4824] __x64_sys_ioctl+0x73/0xb0 [ 759.614783][ T4824] do_syscall_64+0xfd/0x6a0 [ 759.639355][ T4824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.645276][ T4824] RIP: 0033:0x4592c9 [ 759.649189][ T4824] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:34 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x0, 0x9}}, 0x20) 12:38:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 759.668893][ T4824] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 759.677326][ T4824] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 759.685379][ T4824] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 759.693382][ T4824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.701373][ T4824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 759.709356][ T4824] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:35 executing program 5 (fault-call:2 fault-nth:11): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x61000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa65a4000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x7ffc, 0xfffffffffffffffd) 12:38:35 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x81, 0x0) 12:38:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 760.021080][ T4865] FAULT_INJECTION: forcing a failure. [ 760.021080][ T4865] name failslab, interval 1, probability 0, space 0, times 0 12:38:35 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2402, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) [ 760.072070][ T4865] CPU: 1 PID: 4865 Comm: syz-executor.5 Not tainted 5.2.0-rc5-next-20190620 #19 [ 760.081162][ T4865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.091237][ T4865] Call Trace: [ 760.094552][ T4865] dump_stack+0x172/0x1f0 [ 760.098894][ T4865] should_fail.cold+0xa/0x15 [ 760.103640][ T4865] ? fault_create_debugfs_attr+0x180/0x180 [ 760.109481][ T4865] __should_failslab+0x121/0x190 [ 760.114444][ T4865] should_failslab+0x9/0x14 12:38:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa65a6000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000140)={0x0, 0x101, 0x2b}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xffffffffffffe41b, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}, @in6={0xa, 0x4e24, 0x7f, @mcast1, 0x5}, @in6={0xa, 0x4e23, 0x4c, @rand_addr="895013091b8fba91af3effb065d02950", 0x4}, @in={0x2, 0x4e21, @local}], 0x64) r2 = dup2(r0, r0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000040)={0x0, 0x4, 0x1, 0x100000001, 0x7fffffff, 0x7, 0x5}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 760.118949][ T4865] kmem_cache_alloc_trace+0x4b/0x790 [ 760.124252][ T4865] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 760.130085][ T4865] vhost_new_umem_range+0x79/0x700 [ 760.135314][ T4865] vhost_dev_ioctl+0x37f/0xda0 [ 760.140106][ T4865] ? lock_downgrade+0x920/0x920 [ 760.144966][ T4865] ? lockdep_hardirqs_on+0x418/0x5d0 [ 760.150269][ T4865] ? vhost_dev_set_owner+0xa20/0xa20 [ 760.155564][ T4865] ? tomoyo_path_number_perm+0x459/0x520 [ 760.155594][ T4865] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 760.155613][ T4865] ? vhost_vsock_flush+0xc0/0xc0 [ 760.155637][ T4865] ? vhost_vsock_flush+0xc0/0xc0 [ 760.155655][ T4865] do_vfs_ioctl+0xdb6/0x13e0 [ 760.155675][ T4865] ? ioctl_preallocate+0x210/0x210 [ 760.155690][ T4865] ? __fget+0x384/0x560 [ 760.155720][ T4865] ? ksys_dup3+0x3e0/0x3e0 [ 760.155740][ T4865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.176531][ T4865] ? fput_many+0x12c/0x1a0 [ 760.205420][ T4865] ? tomoyo_file_ioctl+0x23/0x30 [ 760.210379][ T4865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.216628][ T4865] ? security_file_ioctl+0x8d/0xc0 [ 760.221742][ T4865] ksys_ioctl+0xab/0xd0 [ 760.225912][ T4865] __x64_sys_ioctl+0x73/0xb0 [ 760.230511][ T4865] do_syscall_64+0xfd/0x6a0 [ 760.230532][ T4865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.240920][ T4865] RIP: 0033:0x4592c9 [ 760.244826][ T4865] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.264461][ T4865] RSP: 002b:00007f8bf3ccfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:38:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x62000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 760.264477][ T4865] RAX: ffffffffffffffda RBX: 00007f8bf3ccfc90 RCX: 00000000004592c9 [ 760.264486][ T4865] RDX: 0000000020000080 RSI: 000000004008af03 RDI: 0000000000000003 [ 760.264495][ T4865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 760.264502][ T4865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bf3cd06d4 [ 760.264509][ T4865] R13: 00000000004c4136 R14: 00000000004d7dc0 R15: 0000000000000004 12:38:35 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10000, 0x0) fchdir(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:35 executing program 5 (fault-call:2 fault-nth:12): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x1, {0xffff, 0x400, 0x9, 0x6}}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xbfffcfff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x63000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xbfffd000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) 12:38:35 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:36 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xbfffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x150000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x64000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) 12:38:36 executing program 1: kexec_load(0x1000000, 0x0, 0x0, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x30, 0x4, @thr={&(0x7f0000000080)="7f77341dd9910346c9bea15679409635ec432ebe960ea5360737d1bc3e29bb247327077d85db6eb6551cfd2a2fe639b574b7d8c294a5a2fb698cde1888652a6d7e1e0e21fd574e5a44f368ee1dd802bb1f81cbb664862ffc7df5bb0b80ab5f48bb5a06ec4d4d6ed96de3e9f9bf4d15c2c56342bea94f9b8c3fb186fcd2a3e50afcdbce433a012f6916e82d6fdd05a7d9d70ca16323ff4ad1e09548141932cd2c", &(0x7f0000000140)="ea412ebafb7ce547636983c93a2e3b25fac40555b5ffb30d0ebe6a4d31294e647a8f5037508f9bd81995d7bb66565db9c22b23a2822b3f39a95bf700757633b7b1beff0ff2c0b664c4669c100c7115f2a8b919739dc2bf3d17bc997e7deb46bb1b41673593c531c56a7615568e54"}}, &(0x7f0000000040)=0x0) timer_delete(r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x101902, 0x0) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000280)=0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x2000, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)=r2) syz_open_dev$sndpcmp(0x0, 0x101, 0x10000080000) 12:38:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfebfe07f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x2c4, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfebff07f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x65000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:36 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x300, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000080)={0x13}) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000001200)={0x81, "10d5e77e8a620cd82aaf0e0bbad9ea948ba46dbcf4d4363fd0386ea944493716", 0x2, 0x1}) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000001180), 0x1000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000011c0)) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) 12:38:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0xffffff54, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xea000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfebfffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x9, 0x102) socket$kcm(0x29, 0x0, 0x0) 12:38:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x66000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfec003ff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000002300), &(0x7f0000002340)=0xc) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x50001) 12:38:37 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x67000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xeb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfee00fff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x301, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:37 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) fcntl$getown(r0, 0x9) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000014c0)={0x0, 0x48, "68a70fd88aa254e8f74675f9ab0e832ff90f2b8602c6e18b49d58776bd9c10330849a28bdb51bb448bd088faeb461096028bc0a504888756aaab03a9616084bb087de4a182f9ba88"}, &(0x7f0000001540)=0x50) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001580)={r1, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x20, 0x7}, 0x90) kexec_load(0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) write$eventfd(r2, &(0x7f0000001480)=0x687, 0x8) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f00000013c0)={'broute\x00', 0x0, 0x3, 0x1000, [], 0x7, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=""/4096}, &(0x7f0000001440)=0x78) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000100)={r3, 0x52, 0xdb}, &(0x7f0000000140)=ANY=[@ANYBLOB="656e633d72617720686173683d726d643332300000000000000000000000000000000000000000000000000000a700"/77], &(0x7f00000001c0)="037f8cb04e26b7b7a34cf123cf3d2976493dbab89665f332a48bd7bb2b84307293b4b51f3032d64737d8189f6497d8c90163bc5c3328b1de4c4e3c6e9a0ad2dc2a823dfc3927a9882d4cd4655ea4e30a0f3f", &(0x7f0000000240)=""/219) 12:38:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xec000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xff03c0fe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x68000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2a0000) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)="38d916d4305a3f87aa73dde4825e2a9e708cf29eb684fff9dbaae053ad73c69a29a51acc93dd5510cdfb662f346d8290b2d9e4a14a66f4ec70b111bdd8c55922dd2c03b15c0134f2cecd8bd0a64f0e92a3a29cfde0c43cd438c76beeea0d424e297f07216aa1e7504718f27ed42a1b337b8ceca63e6a2651f340db8c5883952c3deb5e706d6b8de1661496b52e56f4adebbd9f79c03017a7a0fb34c714d5", &(0x7f0000000100)=""/30}, 0x18) 12:38:37 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x2271, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:37 executing program 1: kexec_load(0xfffffffffffffffb, 0xeb, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xed000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xff0f0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x69000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000000)) 12:38:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000080)=""/33) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) 12:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xff0fe0fe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4b70, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xee000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:38 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0xfffffffffffffffc, 0x200) 12:38:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x41) kexec_load(0x0, 0x87, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000100)=0x80000001, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$TIOCEXCL(r0, 0x540c) 12:38:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffcfffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xef000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:38 executing program 1: kexec_load(0xfffffffffffffffd, 0x18c, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:38 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4c00, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 0: kexec_load(0x1ce, 0x1da, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x5, 0x4fc4, 0x100000001, 0x81, 0x81, 0xfff}) 12:38:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfffb0900}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:38 executing program 1: kexec_load(0x0, 0x26, 0x0, 0x10) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}, 0x2}}, 0x10) 12:38:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x5, 0x111000) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000180)) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040544b83dcf899720d35d5eff1d69a062ab3f7d09ac785f4db85e2c7b0d53c9c5ff7f00"], 0x11, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/116) 12:38:38 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4c01, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff0900}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:38 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:39 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5415, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xffffffffffffffff, 0xe82a, 0x0, 0x4) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x1) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 12:38:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff0b00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040), 0x0) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)) connect$x25(r1, &(0x7f0000000080)={0x9, @remote={[], 0x0}}, 0x12) 12:38:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xaad9, 0x200) 12:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:39 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x541c, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff0f00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5421, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff3f0b}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 1: kexec_load(0x0, 0xffffffffffffffa7, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x2, 0x1) [ 764.558718][ T2496] print_req_error: I/O error, dev loop0, sector 248 flags 0 [ 764.568742][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:39 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="080828bd7000fddbdf25110000000800040004000000080006000900000008000400090000000800040008000000"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x8814) 12:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:39 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5450, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffbffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 764.715306][ T2495] print_req_error: I/O error, dev loop0, sector 248 flags 0 [ 764.742332][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) gettid() ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)=ANY=[@ANYBLOB="0300"/13]) 12:38:40 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7fff, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x4e20, @rand_addr=0x1}, {0x7, @local}, 0x40, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ip6gre0\x00'}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x70000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5451, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:40 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000100)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) 12:38:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x100) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000080)=0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x21fffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5452, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x71000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 1: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfa000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3e0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5456, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:40 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:40 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a01c055b858d24e383d6d930a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x2c) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x72000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:40 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5460, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3ffffffffffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@rand_addr=0x9, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x8, 0x4e20, 0xe2, 0xa, 0xa0, 0xa0, 0x2d, r1, r2}, {0x4, 0x9, 0x5, 0x10, 0x4, 0x8, 0x6, 0xffff}, {0x3, 0x3, 0x18b, 0x101}, 0x2, 0x0, 0x3, 0x0, 0x1, 0x3}, {{@in=@multicast2, 0x4d3, 0xff}, 0x2, @in=@rand_addr=0x3, 0x3504, 0x0, 0x0, 0x3ff, 0x3, 0xfff, 0x5}}, 0xe8) socket$inet(0x2, 0x1, 0xbf6a) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:41 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000140)=0xed55) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x8, 0x7}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x800, 0x100) 12:38:41 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x6364, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x75a200000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x73000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 1: kexec_load(0x80000000000, 0x163, 0x0, 0xfffffffffffffffc) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) 12:38:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x6609, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x405aa600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 1: kexec_load(0x784, 0xe9, 0x0, 0x160000) syz_open_dev$sndpcmp(0x0, 0x4, 0x940c5) 12:38:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfe000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:41 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000080)=""/60) r1 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffe, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@int=0x2, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r0, 0x4) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000200)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x600200, 0x0) 12:38:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x74000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 1: kexec_load(0x400, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x2) 12:38:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x605aa600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x7003, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xff000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:41 executing program 1: kexec_load(0x6, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000000)={0x1d, "346b460d389556512d4918c8e74757cc2b4d57caef857d96274c0c954d"}) 12:38:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r1, 0x206, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xeb1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8b4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x228b}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000810}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x75000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfffff, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x8000a0ffffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8905, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000040)=""/222, &(0x7f0000000140)=0xde) 12:38:42 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x320000) 12:38:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xb0189600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:42 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x140000) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 12:38:42 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8912, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:42 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TIOCSBRK(r0, 0x5427) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xb0479000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x76000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 12:38:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100058, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:42 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8933, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xc0189600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="2975e1926abfaddb63e29e1fd0f642cb14417def73352e8c3a8c9e74743fbdbfebbf13feddc6aac6bef0dca2d007f97425eb27a1a2920978a1d05bfbf1abfa86652e660c86a4bc7185f8b8ff8e512f534144e00a081b278ec6ea02cdbf83e4f114", 0x61}, {&(0x7f00000000c0)="730ab1a8a33f08bf434cdefab3a6df67c7345dbe614a1fd5109a5b51ccabc3f2ae26f9c886de3de5df05450a06d9fb603e06ea995b2cd7b6993d4b3df7bae9e7beca274ccfc076ec169a831fdb87ab18373eccda05cfe158f8651400070475261d34241e74276eb7bae61d4865ef044aeaeb747bfc2199f3d1565994", 0x7c}], 0x2) prctl$PR_SET_TSC(0x1a, 0xffffffffffffffff) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$VT_ACTIVATE(r1, 0x5606, 0xd61) 12:38:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100100, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:42 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x4) 12:38:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x77000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xc0479000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000040)=0x1) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100200, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:42 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x89e2, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x27, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xd0ffbf00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x1002a8, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:43 executing program 1: kexec_load(0x0, 0xffffffffffffffcf, 0x0, 0x3f0000) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000000)={0x17907491}) ioctl$TIOCGPTPEER(r0, 0x5441, 0x80000000) 12:38:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) 12:38:43 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xae01, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x78000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xf074a200000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100300, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:43 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x7, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000040)={r1, 0x6}) 12:38:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x43) 12:38:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x79000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xae41, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100400, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x100000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0xca, 0x1008000) 12:38:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100500, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xbc22, 0x8000) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/219) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x7a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:43 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf01, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x200000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:44 executing program 1: kexec_load(0x2, 0x2cf, 0x0, 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100592, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x7b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:44 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4, 0x3, 0x3ff, 0x10000}]}, 0x10) 12:38:44 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100600, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x300000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000002c0)="8000004038fc008019000300e60100006c000000010000040000000001000000004000000040000400000000200000006d5e2b5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x2, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000180)=""/150) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x8000) timerfd_settime(r1, 0x1, &(0x7f0000000100)={{}, {0x77359400}}, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:44 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001080)=0x1008) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000010c0)={r1, 0x1fe0000}, 0x8) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:44 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40045431, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100700, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x7c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3f00000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 769.348744][ T5610] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 769.387099][ T5610] EXT4-fs (loop0): invalid inodes per group: 16384 [ 769.387099][ T5610] 12:38:44 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x400454ca, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:44 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x847ff) getsockopt$inet_int(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x6, 0xa, 0x80, 0x0, 0xfffffffffffffeff}) kexec_load(0x2, 0x0, 0x0, 0x7fffc) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000240)={0x3, 0x80000001}) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) r1 = syz_open_dev$sndpcmp(0x0, 0xff, 0x5) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0xac00, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0xb71, 0x2, 0x3137, 0x7, 0x9, 0x7, 0x1, 0x3}}) 12:38:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3f50a30900000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 769.562357][ T5610] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 12:38:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100800, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x7d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 769.716426][ T5610] EXT4-fs (loop0): invalid inodes per group: 16384 [ 769.716426][ T5610] 12:38:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000780)='cp\xc8\x9b\xec\xe2=\x1e,g\x00\xd3g,usev\x1a\v]\xdc\xe1\n=\x96{\x90h', 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) kexec_load(0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)={0x258, r2, 0x704, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffbff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x915}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8b22}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x53}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6fa5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa0a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6f85}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff80000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x120000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x35}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8b8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6b31}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x40}, 0x800) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) write$P9_RSTAT(r0, &(0x7f0000000680)={0x69, 0x7d, 0x1, {0x0, 0x62, 0x8, 0x20, {0x0, 0x2}, 0x4340000, 0x8, 0x1, 0x1000, 0x3, 'ib\x00', 0x9, '\\nodev-^*', 0x1d, 'cp\xc8\x9b\xec\xe2=\x1e,g\x00\xd3g,usev\x1a\v]\xdc\xe1\n=\x96{\x90h', 0x6, '#{eth1'}}, 0x69) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x307}, "835635bed6ddec69", "626444798523b6a800eb6b13e2e81ca1f4e10b876e4898b87248910538f09c4f", "4be39a96", "3b81b2fd9e75d68e"}, 0x38) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/372]) 12:38:45 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4004556b, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x4000000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:45 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10089d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:45 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40045730, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x40, 0x20001) 12:38:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100900, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x7e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x5659600700000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:45 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x2, 0x0, &(0x7f0000000000)=""/54, &(0x7f0000000040)=""/102, &(0x7f00000000c0)=""/1, 0xf000}) 12:38:45 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40046207, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10099c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101, 0xffffff11, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:45 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40000, 0x126) ioctl$TIOCSBRK(r0, 0x5427) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) timer_create(0x5, &(0x7f0000000080)={0x0, 0x34, 0x6, @tid=r2}, &(0x7f00000000c0)=0x0) timer_gettime(r3, &(0x7f0000000100)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000180)={{0x0, 0x1, 0xffffffffffffffc1, 0x9, 0x1, 0x1}, 0x100000001}) getpgid(r2) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x3) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x8) fsetxattr$security_smack_transmute(r4, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0xfffffe7b, 0x100000000000002) 12:38:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x7fe0bffe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100a00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x7f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:45 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40049409, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:45 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x20, 0x4) 12:38:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="6e3fe551", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="45000000c8e631c7e93cf56866fff9a325006ed62170162b8da74d80a0065a60d2db2004a82182438b28d723f9dee748c1965060d76cdd8817a9e6122d8c845632d34a83a9b60250ee7c73c9db94c34c7c7feff6bc7bbc2c3be5647fe54dde35d8f4e67076a35954bc7c508fe1afd978c3938aac2b79c00e9cf3f620de1940d105000000ac21910b80d133c2f43b48df2077f14975020f7ef96b6e"], &(0x7f0000000200)=0x4d) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x2a, 0x0, @thr={&(0x7f0000000240)="aeeac9b4e782f0c3a7915ad5cc473112b198c3947907403f2939969627c4d7bd42f581ece59270e3a84fa7b51db856ebd235a2e4caf2a17de67bdcfe6b25bf590f928e578bab88dff22ff55f6a38af4312849e8dcf3c3a5d204d9476380de6b08e955741b9195f442b1e60870eccb8b70a644da992e58fa3362f2621282861c9c32a98b26579dc36eecdfc652e1d45d70340c4f94d5135a732cc6a94b3d5d0e396b00733fbcdd78e1e721a02d0c217d5319e87302be168b38a", &(0x7f0000000080)="ba9b1888cce1f4f044986d7ae1d03a8f166eee84dcc8b346abb5613f712201a347e08250d2246bcb170e7ddfcdbf3687b628cb88e8e8c97191ea2de247b0541e"}}, &(0x7f0000000300)=0x0) timer_delete(r2) 12:38:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100b00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x7ff0bffe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:46 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2711, @host}, 0x10, 0x80800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x2, 0x0) r0 = epoll_create(0x1919) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x201c0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000180)=r1) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x40400, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x800}, 0x28, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x10000, 0x7, 0x3, 0x100000000, 0x0, 0x2, 0x10021, 0x1, 0x41, 0x10001, 0x3, 0x8000, 0x5, 0x16c2, 0x0, 0x7, 0x1, 0x7fffffff, 0x7, 0xf711, 0x8, 0xcc5, 0x8, 0x3, 0x10000, 0x3ff, 0x3, 0xdec, 0x71, 0x200, 0x1, 0xffffffff, 0xfffffffffffffffa, 0x1, 0x7, 0xfffffffffffffffc, 0x0, 0x4c8, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x19020, 0x6, 0x80000000, 0x1, 0x1, 0x1000, 0x6}, r1, 0xf, r3, 0x2) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) 12:38:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100c00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:46 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4004af07, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000100)) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x3, 0x7, 0x7, 0x0, 0x10000, 0x400, 0x1, 0x40, 0x7fff, 0x1f, 0xfff, 0x5, 0x8, 0x7, 0x0, 0x2, 0x2, 0x7, 0x1, 0x980b, 0x0, 0x80000000, 0x2, 0x3ad2, 0x1, 0x87, 0x400, 0x9, 0x100, 0x1, 0x455f1906, 0x0, 0x7fffffff, 0x1, 0x3, 0x0, 0x80000000, 0x1, @perf_config_ext={0x6, 0x6}, 0x51f371db6f51fe98, 0x870, 0x7, 0x6, 0x0, 0x8001, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffff9c, 0x0) 12:38:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x80000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xa0670c0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:46 executing program 1: kexec_load(0x400000006, 0x0, 0x0, 0x2000000) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000040)={0x0, 0x81}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100d00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:46 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4004af61, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0xffffff21, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20004) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000080)=""/4096) 12:38:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xfeffffffff3f0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100e00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x81000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:46 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x2) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x4}, 0x8, 0x80000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000240)={@local, @remote}, &(0x7f0000000280)=0xc) sendfile(r0, r1, &(0x7f0000000040), 0x100000001) r3 = open(&(0x7f0000000080)='./file0\x00', 0x202000, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000200)={0x3, @null, r4}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@remote, 0x53}) r1 = socket$inet6(0xa, 0x803, 0x8b73) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) ptrace$peekuser(0x3, r3, 0x5) 12:38:46 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40086408, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xff03c0fe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100f00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:46 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x10001, 0xa4, &(0x7f0000000040)="8637258faeeff7388adc2d25ca01957029d0488085e98406256bedd11ae7ce53b84fba25da88fae719bf1c8e686d8c228367546edfea9aeb7237ca82e1709b446b1530717efdbc14087eb47f41235eee5aec3a0e6b1737a660e3545bd0394d4ec2e05948f9727f31d3d6383ee88b0a67cf7ccda82f253a6e67320e29cd72863b0fe7b2970a9e7ee6cc5635eaa326cf158dc0edd54adf1a31a9dcadfe2d64319711312550"}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x82000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:38:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xff0f000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:47 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40086602, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:47 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000300)='\x8e\xb5I\xd6`,O{\xd3GH\x89}\xad0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r1, 0x6}, &(0x7f0000000140)=0x8) 12:38:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff0b0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:48 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "c7882aee18bc0017", "aff60873010cf167e9db51cdbed98800", "be3e8ba2", "42de918a2f086b61"}, 0x28) 12:38:48 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x88000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101455, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff0f0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:48 executing program 1: prctl$PR_GET_THP_DISABLE(0x2a) kexec_load(0x0, 0x0, 0x0, 0x3e0002) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000080)={0x456, 0x82, 0xffffffffffffd230, 0xc5}, 0x10) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x100000000, 0x4, 0xfffffffffffffff7}) 12:38:48 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af10, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:48 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0xfffffffffffffffa, 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x381) socket$inet6_sctp(0xa, 0x5, 0x84) write$UHID_INPUT2(r0, &(0x7f0000000180)=ANY=[], 0x0) 12:38:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101500, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x89000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0x101, 0x2000000000000001, 0xff, 0x0, 0x0, 0x7842, 0x0, 0x0, 0x2, 0x25e7, 0x2, 0x1000, 0x9f, 0x23, 0x9, 0xf, 0x7ff, 0x3, 0x5, 0x6, 0x3, 0x60a6, 0x9, 0x3, 0x82c0, 0x5, 0x8, 0xffffffffffffff81, 0xdc1, 0x6, 0xfb, 0xffff, 0x1, 0x739b0f32, 0x1, 0x1af, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x7fff, 0x8003, 0xc, 0x7, 0x101, 0x5}) kexec_load(0xfffffffffffffffc, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000100)={{0xa678, 0x0, 0x8, 0xffffffffffffff01, 0x1, 0x7}, 0x1}) ioctl(r0, 0x0, &(0x7f0000000140)="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") 12:38:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffff3f0b00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101600, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:49 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af60, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000080)={@rand_addr, @local}, &(0x7f00000000c0)=0x8) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 1: kexec_load(0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffe) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101700, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffbffe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40106436, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x86000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x2, {0x2, 0x4}}) kexec_load(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101800, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x86000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffff1f02000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40107447, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:49 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x7fff, @mcast2, 0xffff}}, [0x6, 0x0, 0x10001, 0x98, 0x3, 0x1f, 0x14, 0x3e8, 0x1, 0x17db, 0x4, 0x1f, 0x5, 0x0, 0x9]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x1f}, &(0x7f00000001c0)=0x8) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xc000, 0x9) 12:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101900, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffffbf00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x86000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 1: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x7, 0x200000) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) kexec_load(0x0, 0x0, 0x0, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000080)=0x401) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000040)={0x0, 0xb80, 0x10001, [], &(0x7f0000000000)=0x3ff}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)={0x0, @speck128, 0x0, "d87544a4781e1ac4"}) 12:38:50 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4018aee3, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101a00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:38:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffffff00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 1: kexec_load(0x461, 0xfffffe44, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x600000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@empty, @in6=@remote}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) syz_open_dev$sndpcmp(0x0, 0x4, 0x0) 12:38:50 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x401c5820, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffffffa0008000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101b00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:50 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000015c0)={0xffffffffffffff9c}) recvfrom$llc(r2, &(0x7f0000001600)=""/10, 0xa, 0x2040, &(0x7f0000001640)={0x1a, 0x0, 0x8720, 0x4, 0x7fff, 0xac6, @broadcast}, 0x10) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x5, &(0x7f0000001300)=[{&(0x7f0000000080)="ba9d5cbeda64ff3719220b4a3bbf20709853d25d04ed7b30c54cf75569f95afba9255c67c9e6cc6c65198656bd49cace949bc33c2eead767583485f5724dcc2f3c0ac87c015355db80dee56631e1711d91a16f3030cc94a7571a940173881ebeecb24960661f618ef6bd749848c266f33769c34c015ced0488e362c0ab34275a96f01e724eca29fc2247159ed33377252f8975e2302aed851f122cac40a1efc9f02adad9c6a64c7dbcdce3775583efbd5f9cd019d03f31ee491cdee03fe08a001bb058bd3de049", 0xc7, 0x8}, {&(0x7f0000000180)="0797a2c60d17f30bb5568f40d8ed49e1e6eba7c3de3cd84a86e62a5cb5082d87e8b69e0140c8089d83af8aba7e991874afe10231bb7a202171", 0x39, 0x1f}, {&(0x7f00000001c0)="e7717b3c51bf68cfac13a22b625226a9cc7907dba8ab2c765d1eb1a311991062291cf2173b9a8a80ce45e869527f8007f78b1ff9ff091813ad36058b232bc53c864e328f284e6221c33fe5f1fc2fb9c398fc949770efe1878c8ded67b44d0597cbcfdc1cfc20a2765ee148b63632f4f1ba38e0aa82a4d9f7be80d524a1623983450c2bc6725e2a943b30b7984805fa36af20e1c02802c28f4fc2cf9c09bae35d4fc89f1e7e3fc56641583a17a64b856c147a8d174799513a0a98", 0xba, 0x7}, {&(0x7f0000000280)="38798f4a3770f9f03d3398337674a1f1c3452f34da96c9475ad987449b974ce659aca1ba5c525ec904dbe9e82f65cebab950fd914996ffff9690cce97bcd9e93c877d7edc000091bdad03615b1bed72c17a002f8b75f033d", 0x58, 0x1ff}, {&(0x7f0000000300)="c4a06368207d943fea6d18c7e4034df22ed8476c5bfb2e1fb6f4e49e664a5f3914e7d32548fc794ff3076bedf37fd9e20d0cf328857b44ce8920b11ca052176a599884eb1fa6d483e357610e48aebc2837a602c88c078fe53805000001898c7e740e945a0b322b437647726e92768d0e882c1ac83aaa732096e97ab9228bd81e50118cbdaa1aa9e3c443242778d0109828053ddfcdbb23b5f182d90d3ebdd6d8c68f73349dda1d6d5849494b30efa776aac7597434924006dc06cbaa9ba32b66a6765a225fb6dc7406192833658876c132724706da0f3bad7b306dd8edc56b8ad2203cc238e01bde77d0ac747be84fec85b5b7374ea000e212c5701d49619d3a2e940ead0eee441611b2100daada9ccbe29cebea4e4ad9494718f4007e83048ebb3775cb1ce6b5adb9cf689380687b1ab335094513d8e7f68610c2bfa7daf1551e5ecc5cf7328fe6f9ec73d7c66ccb1e460144b1627cc48527f4f1727171caaf4073408d485b4c784f8b848007f814ac787417ad6eb96931cf997237aa18c5bf9db17b7ce9fde958129319347dba886db6c1016e4436a8974b789029bf449fedb42426df552c9d6b6c27b5cdfff9f5b68249334d2b5b5bf391f9ab82ce76fbd33d1d2684096fc3f89e250cc5e14bc30d27cf781cb1af79ac1010d30c91b45015dfb0b20d6d1b6775c4227cf344013ff9a119b98efd4379b9f29ba6052bd321c87bd0ed28313fdd347a453be4bf3b25e369636fa47756491d9e554ea85a9034486d9df93d48174fb43330485ace383c558b4d810cca1b7d4679a34a36321331f3f2a1f50a4e2fb2b72c9cc18196d3f2925817162b5f3556f91420aaa6afb4118fbfa96a642ef7bcaff33fbcd675be64f98788df9c89777b036d3429eacb663129944b9960aae8085d383b8766b784fbd2cc90d901f82ecc7379c3b0b9869425e2063bad201419ba8beead87d8d77c6dd693b7ecb2e7e512d5716d27b6578c786ac516a43e80579fd13a04673ef85b8484ff58e6612e7c905ae219df2f51ba6a141eb48c22365a933def34384cdca14d781b1d907fc890d158f89d30bab11ad90688154e57681ab0d1023be6d6f4d24acb90d54421bb7245b93a46f0d688eaa2cb59c385cf5b54ca4f36c788b430d05167bbb5a4d44d83c5cbe5a108361f3ac20f76c80fb9ede6faf4172617c51e82ffb6a9aad844aa4f12c57c9cb90be2340d202666c5241aa34c67ac242e54814c7ff42caa94b8af074004c8e7403b597a4d2030fd53fb823f2434d2d5c8a9534781e45e9d90ad3891de8f6dfbfa2e40a8d9193098ecd1338814c55fec9a772651b36be44aec0f9dd99ee180df1ff84aa22bae49d445350e335e6260f5ed2fae6b38f0deddc412f7e9886f6bad3b1256bd1a21367ad4d05f18d5a2edfb4d5ceada2720d51f22d158dff2dfb67f5df7917c8e019d41fde6ac65fc3e80ad6b2fb4a6d15c50bb627ab3c40d42cbaebeb44df0a588e9b75a4e907e6be4df460cd2214bf7c99ad2df377ed400da600ad3196880e631186dc211efb4f989ed61944d375f33642830560cfd66a0ed90bd2b42993f4a7b8696d3098487838d0bb881794607187784960b3d7a63c0eabcfacc88e5b594ed9126e7dcd0febc743411410f7496cfd96db1091e17ff869ed71d0bfabd843a738654a7dfddeb490b2c2e7d9102323b313147c44c078a8129e609924a2b38e172154eaf1a06598991213cb595b7af9bb2362970cead8a37cb968ae0b996e095cd3b783d6efa0046c1aaf213f2965290e7b20f7bcdfe2b8b4e659db4d3f10fbc2e5c824036ea126ae08d3d583573ff5321b98af4e4ccbe3b6eaba764c2bb2c119672f4fae2d15295484633ecb710d175a5e0d01889cb20d94dfdbe765e8c8b60167d26f416921111ef0f9857b0bab5f8014fa8ed8ba2c10df1271d1c45681165bc797787bf27ae37a22976932015e40bdb51cbb78e7cca41bed3fc8e0963e8d3723a0a65669144b3f7b145aefd59361c50a235fa346095caa1153c47614936a545a17d6bf70412f49dc4efe32a7cbd3be31e5e99522fefb1c6a8e63a60c610536197f66bdfef53f12e4e145e1496ab2c0d1ca9065f22475d517962770f0f05d0cbb08925f30dd1be09a15e34340017c4f36bcc2576ffd990b3bda421549b6f6cc0809fe1af5613f1eb3b0014da25a47ba0794992dd1089f4eac0ad36a2d89fad9df6febf02182b219c6399d7122ef41cef733607f2cc5ac101f5824543752bf3ab20b5a077a1a0c3c6484b1a6038b4ac35369ff74df584f1c76f6d90e82c49b796434d8f9af19fff8d9f934dd0ec396db577dcf13a8335f00351e72be011ba6df592ab19480de7ae2105e0ceb0555bb26e441a41e33a911f1301855f177d406834bd6446eae9591fb702aa8a7fc07d9bce75f78a685ea4ff845aef327c69c739c27af1681dd9b27cbd7e295f8167df87d8f8a333e642b03eae281b9c43c92b98bd330485d65ddebb9163bb71eba5dede3d7dbaa83df3936f9627ad59f1b93b8b4b4813ac036249e4bce23a362387d6a09d0844ebe839d83cd7f5cd4b4012071690ee28639936991a16277642ee527451e3c667cd6d8d4ff7b72743526df3c4c25867b0a402f2121c6bf30975db950512a5bb9c839ea22dee2864fc1f0b6ff4e209b876d6e26060657e05c7a204e8806b702037325c592c0dab35035608fdfdd0e0aa71bec38d197d37363e9e3bb2865f4dc5aa34e468e634acdf7b3e5a3cb5722f953931d3f54c802eac59361acd7642b7ddabefe8abf74b46d51ff0f29025391545fdb7b217954728fbee10476175a28a8e317fe4e71b7150b90d33c36a3b51c2e25d09c42bf6a7f0f4d718f67ae67b3af22e39e66c287fd1ceaa1cba224b2480bbe8b1ad4fe83034850ad7d5aef41fa9a9e265dbf2130f8ca21d9afc34db3838947323db3b2b068aeb53e2e2eb3f143339f58786e094eb94789f8651f3223f026dec5bda3f4b5998165b785285b8b82d258d27a4db83c6d910145d104b01c692449c4bd9b19318292979d745b0ea955b524a54e66b544b252b3c6a7ba3951d616ee03a4a877ac970440d1684fd1aed4317b1648a1d4f1a73ba7b811466a5327f036522d6852bad7cf7f9db770ee9eba8ce8d872757e713f09b3c426363840c85046d45e087ab84ead922efdc2cfedbb0f137383ae70899981026cf2101ce6a3436a87a8dcb963c763087bd881e1ca996dc234144564a09a97553ef9536e21b399f391823408bdf827b5829dc38be199a7745510f514f6d8b23b787419ce7b7999a12ff3f8e6fd08eb6019e02dbbbb330dbc859668b79da2ea58897ab0d83fc4837bfcbe5649c264e4fe98a2b30d260bdbc162a4e6eafe280466f4d318e11030040d19089eebf3fa9144738e5e7ec9fced72f8485b1ee6b0df774b9ea4cc67a8483b6e48b80866b729c6d2abdeff579e3c83b4dc79a7e32f0b4967b0949bf7255f4bcb3579d3aba0d7c2f571719794aed1b8604c4037454117917054b6cf0f2a31fa46fe787bc6519b83e402ae3cef42cbc36c99e0d9457baee2f2beddafcdf8622b0fac554653fcfd7af6281a8611c2fdf6a8de273ff431cf26fe1fa3e914b3ecf0ef63790d779b602ab6dbc0b7899f8e48e21c41a8bd1b5a16b4bba0271d35e972ff868a59978687934fee8b73f7246cb1af6e75affc0899be9c4083d2d7e958ee58d845c336ace06bd7e119189bdef7671a5380de46ef4f96ba4ad7655521ba56dc379379fe3688b1e45fb26aebbace2a5ac839cfd4ce2c6af436cc020243342fa0ac0b1b7785761da56a42960fab3790b3cc51f6b1ae31122bf1edf2ff7e7d023168c13f417484b2ce900c101ed98e21b608fda6413cb22da40a219df0c8f896760b6581c9e7e8a505cb535014c44ee738bda3cd3e2915523bae3bf002f630cf6815018d6059bc704b42807c740f637873b18146ed9fa4a58c3c926dae11f950141120e217c3b15cde6f0e32a391acc56354e1ea4c714f2440ed04017fd9e662a6fa96f9f76abd7914877b9de22c495cf69e0703e32888f485600b72174a8ee45a8c27e9776f0115972e324e7c35bb9cf29e3cf66dcdf21f652b4f3adc25c298e94e5c3ed66e94d2248dc6b90efca61f77d15c9a42a07201260e2e3dd4756bfe2e43af36d8b02e365b21f28735100fb9b60963a8be61edff885642726a9317244f0a16145ba69cc9c4ef0f13fecb3fdfa72853bf5755db8985e7812c4012d6973a54e4f190e28125bbf288eb9ade3bf0eed11a4c42996f2443ba87cb085cffbd2fe0b60a7457efe80e0a9d939e4f89f5abe1cce4bc7ba32420efde87a1d34b2ebded852cf7c5529a170dd4371c8fda69ac644866332f5521b1852e1d6ce59bf3b3ebd0a84bd7f53336ff19e3543b9d52fc87d3ec75964db037f2273986445749095bd46b00d0938f2c9fe61d35154137b281bc2c1b36860f253b17470269369b007b9ba481cdf8b8eb25d2d8da5a7eb4b52ae7095a2085498dd4a4d3fee86f9596022ae410ca33b1efb172156241371b5ca3f3ab3f627eca86df04da709dfe58920bdc9a459eddb5e0a17ede5161fa3187cfe85cf3ab3d5714ac545445b9221c074a9241e5e007bfd948426cd71e4d315f7414c9bfbd4d756c78048b3ecefddcacf9fc91d1b8b7049e964087764feda37971e777a8b57a0be9fbfd9d020b41cb6e6d110e59312e61c43d0ffd5120050137bb83d669b9f306a448abc4f01526406501f6124e1bd45aed14e542d1bbccd4a157a90ed1513a20d172ff2ce9950b05780e15444622169902b86eab38e9cccb0a8aa2c1faa5862fcbcf0d943f3e756548e373c3efcc93546e337dbae8af2ea9ffe255d815d0f249a5ff3752a2c0bd25bf4c24de7407a9a9d0f9628700484566339d161e0ca9cec911fb33996ff1259197848d7b0a407805f8b92d71002c3af0e6cf023a6847be32e13fec4b0423fae37fd40ebecb987d61d4db555340ebc8a9ed53d4d4f257e13dbe078626e2330c7b850eaaed89edf3a8976f0f499b3e88b3e60092ab03bfb83f5ad108bb2a9d743cbd9f96332e457f3efaf90ffc5831eaf8e3b22c786434cab4595559500037c73f562cad24b8eadfaf092d3436a32c0605218f5e38bbad40180564efed9fd168fcc567622d66b149382b7f068d6c638aa6f734f2c1bfe9563788e140107e84188aa89fb7aa875d4fad2d9ff62a1409a811c99149a6f344ee54e99c40ea908492d285d09a91b01b042938bfd28b9e4013b9bd83389a74c1c7d19bf832e8cb57915ec217f816fe9038eb68f81878bea138e81353b098b1804fad4100002fea46c73b6c8263940850f09968b408b6a572d8a01e56ed58df50e1fb3679bf544bb0816eac1847f5af3609d0ff301cf868194e691f78a9da5ff8b87a879c397fe789971acfb2aae849d16598e0d9bf6a2d14cefc0c95ec99de6b9c93db4f4d55b58a5df23385f402587be4a40c9bb2307e5d6926a37ae66cd206604c270da86305a0f8a30f1e112ff162a1eeae55fc562d8d84e27eacef1ad2d0cd2334290c0898be3ee91408435c02ee5b2a7488de9140739540362c6621547a53e3f5d954e63f3a5a0d23cfa397c2c7afdb79cedf12966d59443a3edf6be2ea3be5ac27eccc2099558bb7c2d77ecc8b5aca8a0aa36bc288129be964d9f2cc84bff4ba669c47a7240681cb8727a06544e4bde0cecae8df08e0b72db26a8964faaa96889016ab87629897fc4335616078fab2f49900bf9c9126c50bb23644af7dff2bcc22c97ce99db", 0x1000, 0x5}], 0x2000, &(0x7f0000001480)={[{@iocharset={'iocharset', 0x3d, 'macturkish'}}, {@type={'type', 0x3d, "de9d1fd0"}}, {@file_umask={'file_umask'}}, {@codepage={'codepage', 0x3d, 'cp737'}}, {@gid={'gid', 0x3d, r0}}, {@uid={'uid', 0x3d, r1}}, {@session={'session', 0x3d, 0x7}}, {@quiet='quiet'}], [{@obj_user={'obj_user', 0x3d, '&systemcpusetem0.ppp1%eth1('}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_measure='dont_measure'}, {@subj_type={'subj_type', 0x3d, '-trustedselfself\\\'}vboxnet0'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, '%]+}mime_type'}}]}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:38:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101c00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:50 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4020940d, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0xffffffffffffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:50 executing program 1: kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000000)={@null, @bcast}) 12:38:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101d00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4020ae46, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 1: 12:38:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101e00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:51 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4028641b, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:51 executing program 0: 12:38:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 1: 12:38:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x300}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x101f00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:51 executing program 0: 12:38:51 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4038ae7a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3e00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 1: 12:38:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x90000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:51 executing program 0: 12:38:52 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4040ae79, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:52 executing program 1: 12:38:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3f00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102100, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:52 executing program 1: 12:38:52 executing program 0: 12:38:52 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4090ae82, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x91000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x4000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:52 executing program 1: 12:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102200, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000002c0)="8000004038fc008019000300e60100006c000000010000040000000001000000004000000040000400000000200000006d5e2b5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x2, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000180)=""/150) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x8000) timerfd_settime(r1, 0x1, &(0x7f0000000100)={{}, {0x77359400}}, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:52 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4138ae84, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102300, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x75a2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 777.695887][ T6240] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 777.791400][ T6240] EXT4-fs (loop1): invalid inodes per group: 16384 [ 777.791400][ T6240] 12:38:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x8e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80045430, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x92000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff0f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102400, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:53 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x800454d2, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000002c0)="8000004038fc008019000300e60100006c000000010000040000000001000000004000000040000400000000200000006d5e2b5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x2, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000180)=""/150) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x8000) timerfd_settime(r1, 0x1, &(0x7f0000000100)={{}, {0x77359400}}, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x93000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9fbff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 778.253084][ T6277] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 12:38:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102499, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:53 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80045500, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 778.394699][ T6277] EXT4-fs (loop1): invalid inodes per group: 16384 [ 778.394699][ T6277] 12:38:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102500, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9ffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x9618c000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x94000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10258b, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:54 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80085617, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xbffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102600, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 778.928357][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x95000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xc67a0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102700, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:54 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80086301, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x96000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x3f000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102800, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 779.418674][ T2496] print_req_error: I/O error, dev loop0, sector 504 flags 0 [ 779.427607][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:54 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8008af00, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x102e8b, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x4d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x97000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:55 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80104592, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x103000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x405aa6}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x98000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:55 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x605aa6}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x1035a9, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:55 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80184540, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 780.138473][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x99000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 780.242316][ T6426] FAULT_INJECTION: forcing a failure. [ 780.242316][ T6426] name failslab, interval 1, probability 0, space 0, times 0 [ 780.311167][ T6426] CPU: 0 PID: 6426 Comm: syz-executor.1 Not tainted 5.2.0-rc5-next-20190620 #19 [ 780.320248][ T6426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.330328][ T6426] Call Trace: [ 780.333638][ T6426] dump_stack+0x172/0x1f0 [ 780.337987][ T6426] should_fail.cold+0xa/0x15 [ 780.342678][ T6426] ? fault_create_debugfs_attr+0x180/0x180 [ 780.348489][ T6426] ? ___might_sleep+0x163/0x280 [ 780.348508][ T6426] __should_failslab+0x121/0x190 [ 780.348523][ T6426] should_failslab+0x9/0x14 [ 780.348540][ T6426] kmem_cache_alloc_trace+0x2d3/0x790 [ 780.348559][ T6426] ? lock_acquire+0x190/0x410 [ 780.372852][ T6426] ? __x64_sys_kexec_load+0x1b0/0x260 [ 780.378230][ T6426] do_kimage_alloc_init+0x41/0x2c0 [ 780.383347][ T6426] do_kexec_load+0x15e/0x600 [ 780.387954][ T6426] __x64_sys_kexec_load+0x1d5/0x260 [ 780.393167][ T6426] do_syscall_64+0xfd/0x6a0 [ 780.397684][ T6426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.403580][ T6426] RIP: 0033:0x4592c9 [ 780.407490][ T6426] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.427104][ T6426] RSP: 002b:00007f8526f82c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 780.435538][ T6426] RAX: ffffffffffffffda RBX: 00007f8526f82c90 RCX: 00000000004592c9 [ 780.443520][ T6426] RDX: 00000000200005c0 RSI: 0000000000000010 RDI: 0000000000000000 [ 780.451505][ T6426] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:38:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) 12:38:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x8000a0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x103891, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 780.459487][ T6426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8526f836d4 [ 780.467492][ T6426] R13: 00000000004c5221 R14: 00000000004d92d8 R15: 0000000000000004 12:38:55 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8138ae83, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10389f, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:55 executing program 1 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xb01896}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 780.686023][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) 12:38:56 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc004500a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x103a91, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xb04790}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xc01896}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 781.085741][ T2495] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 781.093205][ T2495] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 781.103816][ T2495] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 781.111232][ T2495] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 781.119703][ T2495] print_req_error: I/O error, dev loop0, sector 16 flags 801 [ 781.127174][ T2495] Buffer I/O error on dev loop0, logical block 2, lost async page write 12:38:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 781.135661][ T2495] print_req_error: I/O error, dev loop0, sector 24 flags 801 [ 781.143050][ T2495] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 781.155703][ T2496] print_req_error: I/O error, dev loop0, sector 32 flags 801 [ 781.163116][ T2496] Buffer I/O error on dev loop0, logical block 4, lost async page write 12:38:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x103b8f, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) 12:38:56 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc004562f, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xc04790}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3e00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x104000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:56 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0045878, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 781.580427][ T2495] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 781.589029][ T2495] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 781.597687][ T2495] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 781.606352][ T2495] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 781.615224][ T2495] Buffer I/O error on dev loop0, logical block 4, lost async page write 12:38:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xd0ffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10409c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3e0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xf074a2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0045878, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10458d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x1000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3e0000000000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x1046a9, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:57 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc008ae05, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x3e00, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9fbff, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x1047a8, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x2000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x3e0000, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:57 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0104320, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x9ffff, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x1048a8, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x3e0000000000, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0106426, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x3e00) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x3e0000) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x104a8b, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:58 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0145608, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x7605956}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x104da3, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:58 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9a3503f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x3e0000000000) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x105000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xb3fffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc018aa3f, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80800, 0x0) r2 = dup2(r0, r0) socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000200), 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x2, 0x200, 0x9, 0x1400000, 0x6, 0x9, 0x5776ff55, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e23, @rand_addr=0x7c9730fe}}}, 0x84) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r1, 0x12, 0x1, 0x3, &(0x7f0000000240)}, 0xffffffffffffff96) 12:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10578e, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3f000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0205647, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x105f5d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3f50a309}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:38:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x63f) [ 784.585889][ T2496] print_req_error: 8 callbacks suppressed [ 784.585899][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x105f8a, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:38:59 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0206434, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:38:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0x5, @remote}) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x106000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x40000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/148) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xb) sendto$inet(r1, &(0x7f00000001c0)="b3ccefeb459bb1ec4bcf3b73b9cfbde216f7597d88289e2bd781b9fd6cbac3564b86897e1755a93339067a483dbb12e323147c693069e51aa0b0a8c1b400b22bf5643e16dc22d16d10a267e552b8a07db5912d3cbf30395ad22cd181d3202c671d2051063b4dec38af8d4742b66a20d3eb40df99be062d261936403a1552c63a38ba6ab63ddab88078136928b9ac5b4f5b19e814f84d5bb87752857bd05556934735870881c38b0cea804f11131d6e1a9052a16f8db9825f203d23a7f7d5998384f22e551c201bd41732747a372a07c5", 0xd0, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:00 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56596007}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x106157, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 785.116179][ T2496] print_req_error: I/O error, dev loop0, sector 376 flags 0 [ 785.125354][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc020aa00, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x106d5d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x7fe0bffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x401, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x4) 12:39:00 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc020aa04, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 785.537405][ T2495] print_req_error: I/O error, dev loop0, sector 248 flags 0 [ 785.556119][ T2495] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x106e5d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x7ff0bffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc02c5341, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x106e81, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 785.985870][ T2496] print_req_error: I/O error, dev loop0, sector 120 flags 0 [ 785.995607][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xa9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9047b000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000600)={0x9f47, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x0, 0x9, [{{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}, {{0x2, 0x7, @rand_addr=0x1}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, {{0x2, 0x4e22, @remote}}]}, 0x510) sendto$unix(r0, &(0x7f0000000040)="b3413d21d8528c67896591519e9376541fd078a62631ec7e55f5f6e64dc5bbec795e163c3bb572463873e36c18faaffd79e15b755b7a0a8be958f2ed6f06c93b5daac7786ecd3d559161e6a772b26512fd5512a6973b0685", 0x58, 0x1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000180)="8a6d5e6ea20766aaf56196d83d28c69f104672199e524a0a39e277929eec7cecefce6d797df13bca566b1cee6eb5c6be63b28455bdacefc9ab3ed68b0a67d81e7f8e56045bc3d3384a130fba0ec7930d42bd27de7f42dfe73c59be2d", 0x5c}, {&(0x7f0000000200)="51fbf0a2fce292a1826084aafec772cd0f3dab1f3594b5b2f4b18fe6b947e03844eb90db7948bdbe79050cc119d0948349a6b82e3dd40bc7504b9bd3d3e0c8ce18abfffec1bc0f6531c1f1918bc1bc2f1687c72f52", 0x55}, {&(0x7f0000000280)="9d0881b6f8c12de35e9f0a67bb5c1e454b93fbfeac841d72783c481c684a869df122804d2b43249fb0e239c9cb75541d1d7dc361e65b13cce85cdb11421971b11e5eccba762c1d62127a432ccd6c94e4f12124e0039394c1480d322e136e54325b0e337873fb0f95d741772cc4d23fd0ff9c661e36c2d7474e19", 0x7a}, {&(0x7f0000000300)="99aa5858eaa771573c5aee764babf43ac0dd80db0a8bd89491378df254bfc96b5621fd0cf3b5c94d95c7480c20ace5e08bdb923a01246db67b8970cda3816b73", 0x40}], 0x4, &(0x7f0000000380)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x100000001}}, @ip_ttl={{0x14, 0x0, 0x2, 0x401}}, @ip_retopts={{0x54, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x9, [@local, @rand_addr=0x1]}, @rr={0x7, 0x17, 0x9, [@loopback, @remote, @multicast1, @loopback, @empty]}, @timestamp={0x44, 0x20, 0x81, 0x3, 0x101, [{[], 0x6}, {[], 0x2}, {[], 0x5}, {[], 0x75f1}, {[@loopback], 0x81}, {[], 0x1000}]}]}}}], 0x88}, 0x20004005) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x106ea3, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:01 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0306201, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:01 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x14000) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x3, 0x10001, 0xffffffffffffff01, 0xe75de68800000000}, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xaa000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 786.368463][ T2496] print_req_error: I/O error, dev loop0, sector 504 flags 801 [ 786.376220][ T2496] buffer_io_error: 3 callbacks suppressed [ 786.376231][ T2496] Buffer I/O error on dev loop0, logical block 63, lost async page write 12:39:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9047c000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0345641, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9618b000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xab000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x101, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000100)={0x43, 0x9, 0x2, {0x1, 0x80000000, 0x0, 0x2, 0xd8, 0xd52, 0x5dc704a, 0x8000, 0xff}}, 0x43) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) fcntl$setflags(r1, 0x2, 0x1) 12:39:02 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0345642, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 786.837613][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10715d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x9618c000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0386105, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xac000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10725d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) chown(&(0x7f0000000000)='./file0\x00', r0, r1) [ 787.259312][ T2496] print_req_error: I/O error, dev loop0, sector 120 flags 0 12:39:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107286, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xad000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0485660, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:02 executing program 1: pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000001c0)) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000140)={0x7, 0x7f7b7f5b, 0x1ff, 0x10, 0x3, @stepwise={{0x4a6, 0x7ff}, {0x3, 0x5e}, {0xffffffff7fffffff, 0xffffffff7fffffff}}}) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x400000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x5, 0x4) 12:39:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa0008000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x1076a0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:02 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x284000) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0x100000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x3) 12:39:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa0670c00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xae000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0505350, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xaf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x962, 0x0, 0xfffffffffffffffc, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5, 0x0, 0x10000, 0xffffffffffffffff, @perf_config_ext={0x5, 0x2}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0cdb97ff7d8bc8c51b8e38c0c4ef732ac861c530c5f568dfe04a76cde47a5a7882944485d3e316278d1790f3aee7329f28bbb33d7dc1a96ec4a987ca4e813731ce28a5f03038bd40da66d870841f199bfe83763e0f057bf4496a1e08caaa6da9ac42127b4ae37f8980f6acb7125e683731f879489b4a9cece5a4655e9d2484c0d5aa77afc9b58002ddb813e0f4ef6878f68282b5ec5027e638addfee1fe1e9fc3c6b551d815a7566cb3bfb5fc0792b08a5981bb178563d8cf6c1cbf74ead9a526d84e0e3b3deaa", 0xc7) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107798, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa274f000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0585611, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0a85320, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107896, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa2750000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x10000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1592eedb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x200}, 0x0, 0x5, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x4000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x6) 12:39:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107a59, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:03 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0bc5351, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:03 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1928) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r1, 0x4bee0c58}, &(0x7f0000000340)=0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x1}, 0x20000094) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 12:39:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa65a4000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0700000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 788.958918][ T2496] Buffer I/O error on dev loop0, logical block 31, lost async page write [ 788.967777][ T2496] Buffer I/O error on dev loop0, logical block 32, lost async page write [ 788.976773][ T2496] Buffer I/O error on dev loop0, logical block 33, lost async page write [ 788.985371][ T2496] Buffer I/O error on dev loop0, logical block 34, lost async page write [ 788.994738][ T2496] Buffer I/O error on dev loop0, logical block 35, lost async page write 12:39:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107a5d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 789.003473][ T2496] Buffer I/O error on dev loop0, logical block 36, lost async page write [ 789.012520][ T2496] Buffer I/O error on dev loop0, logical block 37, lost async page write [ 789.021124][ T2496] Buffer I/O error on dev loop0, logical block 38, lost async page write [ 789.030130][ T2496] Buffer I/O error on dev loop0, logical block 39, lost async page write 12:39:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa65a6000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0, 0x226, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:04 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x107b96, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="f416ce36a240b153c9618549d08cda34e1d6c325a0b628b9dd66ada73d0370393b5632a90dc890c2b0e7ea31c77469253b711144fc6c7aa8acae7e88edd10c51160187138a3ae13a28f3f2e6bc3dc36c67cf5b416297f2b822f9bfb1c40967e22b39706628d242ca86a8af14683a7b30ae", 0x71, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, r0, 0x85, r1) 12:39:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xbfffcfff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x108000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:04 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0003000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xbfffd000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x600400) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="5700000032994c01c017873edafa2ef7e973932ba7d90d1c48b1ba994c65c9470cdb10e7f42759daa652690c57523b35c9e4c5a010d04c6d049bfc90d6fb5d17cfc37548b5c350adb942ea23b3ac0000000008726c371bfb9fbdde"], &(0x7f0000000180)=0x5f) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') unlinkat(r3, &(0x7f0000000040)='./file0\x00', 0x200) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x80, 0xfc) 12:39:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x108398, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:04 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0005000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10858b, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r3 = epoll_create1(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r3, r0, 0x7}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xbfffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0006000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 790.025300][ T2496] print_req_error: 18 callbacks suppressed [ 790.025312][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 790.038936][ T2496] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 790.070801][ T2496] print_req_error: I/O error, dev loop0, sector 16 flags 801 12:39:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x108594, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfebfe07f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="8800002000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000040)) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400000, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x4000) 12:39:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x108993, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 790.441092][ T2495] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 790.448654][ T2495] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 790.456411][ T2495] print_req_error: I/O error, dev loop0, sector 16 flags 801 [ 790.463837][ T2495] print_req_error: I/O error, dev loop0, sector 24 flags 801 [ 790.471680][ T2495] print_req_error: I/O error, dev loop0, sector 32 flags 801 [ 790.479328][ T2495] print_req_error: I/O error, dev loop0, sector 40 flags 801 [ 790.487339][ T2495] print_req_error: I/O error, dev loop0, sector 48 flags 801 12:39:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0802000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:05 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfebff07f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x108fa4, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0803000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfebfffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x109000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xb9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0804000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x10, &(0x7f00000000c0)='#bdev.!keyring}\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x9, 0x7, 0x80, 0xa1, 0x0, 0x3, 0x20, 0x2, 0x6, 0x1, 0x80000000, 0x5, 0x5, 0x0, 0x0, 0x100, 0x3, 0x3, 0x100000000, 0x7, 0x1, 0x10001, 0x5f, 0x3, 0x7f, 0x6, 0x9, 0x6579, 0x9, 0x7, 0x0, 0x8, 0x7, 0x100, 0xfffffffffffffff9, 0x1800000000000000, 0x0, 0x9, 0x6, @perf_config_ext={0x100000000, 0x3ff}, 0x400, 0x100000000, 0x3, 0x0, 0x2, 0x8, 0xfffffffffffffffa}, r1, 0xd, r0, 0x9) r3 = dup2(r2, r0) sync_file_range(r3, 0x2, 0x3, 0x7) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000003c0)={0x5, &(0x7f0000000340)=[{}, {}, {}, {}, {0x0}]}) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000001600)=0x4) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000400)={r4, &(0x7f0000000600)=""/4096}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x0, 0xea}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000540)={r6, 0x7}, &(0x7f0000000580)=0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7, 0x2, 0x0, 0x3ff, 0x0, 0x4, 0x4120d, 0x8, 0x401, 0x3, 0x2, 0x3, 0x5, 0x9, 0x101, 0x3, 0x9, 0x899, 0x100000001, 0x4, 0x7d0273db, 0x5, 0x5, 0x1000, 0x20000000000, 0x0, 0x4, 0x4, 0xffff, 0x57c1d79b, 0x7, 0x6, 0x1, 0x7ff, 0x4, 0x0, 0x0, 0x824, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x10, 0xffff, 0x7, 0xf, 0x7fffffff, 0x0, 0x5}, r1, 0x2, r0, 0xa) ioctl$IMADDTIMER(r3, 0x80044940, &(0x7f0000000380)) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000001640)=0x3) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000280)={@hyper}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x20000000000000) 12:39:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfec003ff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x109194, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfee00fff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x500000, 0x1fffff) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 12:39:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0805000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xba000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x109254, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff03c0fe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0806000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10938a, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff0f0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x5) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000180)=0xa0fb, 0x4) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$P9_RFSYNC(r3, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) 12:39:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10945b, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0807000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff0fe0fe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x202081, 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x400800, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="46a3ab7d50acb4250dd507303a8b244081cdec2cc16f098b6b018d233d8ee63c0d8e6a4f8f13b71fab4047feb0212e740a8a594d9ad2993295b401be0c4ecc378f0a991d53b49ec78aae2b53a53a0f9692e1f25a2425cae6e0579185c03c53ca15985f4b468f859e35891613e3a515043828fe0bb6904e4b7a0484f2defe3205b35afa0c6449bdbb0360be99", @ANYRES32=0x0, @ANYRESOCT=0x0, @ANYRES32=0x0], &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xa5, "222639e65a2ae9b1315ee15b0065b64b7b5b26090c8466a204703e735456f920d1a1d8ac895fec5b563190112f4924fca8f182e0d87a79e1a5f8569d4403e68a498e6eed49fdb71350e5bf05579a18b67d4cfc559537b74046950fb2c18cd10a5621cdb422219182c6c8ff42a6f9bbc6bd54f7201b6c205579904fff805cdca97f305f7cead97995ad93c5f30b2c2ee6ea4ee78e93c53964172ccee5558c009a77b2486866"}, &(0x7f0000000040)=0xad) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0xfffffffffffffff9}, 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x81) 12:39:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x109b9a, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffcfffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0808000000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x40, 0x80080) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x6, 0x4) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x2}) kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a002, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x80) 12:39:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfffb0900}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:07 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/95, 0x5f, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r0, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000001a40)={0x0, {0x1a, 0x4}}) kexec_load(0x0, 0x9, &(0x7f0000001800)=[{&(0x7f0000000240), 0x0, 0x5, 0x4}, {&(0x7f0000000280)="bc1d500f3dd100199718aae09ca024592f71c414c6ee839d81df7cdd103816937daed91cff9f25550ae8973cd7723b2f1d7faedf958bde92cf8426ecdd4f46f55d4fd7279ec37f20146b3ca1d2de78bf4a160fc0846a2280872fe2d5b8078aec45a66dcbf55c373d8b96b88332ae5fc28e25bc181bd22982047e196eeaec0c8e96c77fc007134550ef", 0x89, 0x80, 0x5}, {&(0x7f0000000340)="8f44486281869be2601b67ab5e30f52058ebc04d1acb800bc5bb12aa620980bb98f8bfeef055c0f26ad8e3a6ddb18ede6ec515c82eb8be94b39defa88d97936ed2e1c0bb64d72ee4527ab3e4bd80d6ccc867320d5eeb09c5492388306f91e4b129", 0x61, 0x6, 0x4}, {&(0x7f0000000600)="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", 0x1000, 0x10, 0x7}, {&(0x7f00000003c0)="f97be66c914822fe41bbbd300d7e201e7ddd2675314a85f9ca1eb7ef0a0ee3d4c7b4b5d16158ca2b3e149a54cd8cfe0b2ca2573a4a95cd3bd4a8c50ef0b2f26c3779cc721c22dec582772ff15e54e95f7f867537191871d0ec81f81604dcbae766bfafc9689e342d3d08c4cdc2eb662e8832b54d43f842ed6b48f7f227cde95a4e795ec108044e88e4496dbc636f85cc94c93f4b9ccaa7b2f1e131e4288a3699bd1e9d6e13b110210078a715742debb7552a85e95afdb15d264c8d1229ba45e3a7ccad1a798f668bffa7bbab0bcc2fbda8b0236969c3195500348b7b0b2c0b3ae33545bed95abb2bba01c0dfab7b7b9578889dd6e48a6d22811763", 0xfb, 0x5, 0x3}, {&(0x7f00000004c0)="f2627be042c130fc32414399a56fcd79fbc9184c0455b965a98a894673fb6da0487b318937a1cbfdd1c3bcea08e08b5130925c1fd6ed379994026e7aaf9b2e0e45e27e398849c17e03ece99042e80543d424391eb053574b82c17af9464d9780a4b5a04f362f93e310daff63ed4e057f323f9627011137fb529a349a8f8777572dbaf088d012aa200991ba9bdcf8758a9fcdef191f0bd16ef0cb640e8a44057e5e7423ee6fdbfdadd60d223fb87663a8b8a652fef63e21819bae1c598e16a425f8b78191dbfd1722dc0ca2de118f330003d0aadc188a99988e222bdd89352ef72c9eef0e011a", 0xe6, 0x4, 0x81}, {&(0x7f0000001600)="aff0abd2a97ac5aa3bb60dd41e37a536d989c236dedb6322c972e4eb332badc10f0b8d3c7e4cf022748e6c7355f083e76321e8becd1b0048a9e2857ca7ed3fa59342125fa1c969b2db05c8d76679af35109e62cad3a5703a9b4b554f9740658cbbe68512f07afc67d0fcd431274215e0f64ebdd1776aff9fa16e78981d7a6ed4583e413e76b8d78eb4344fa7d0aa7153317ccf9d35077f3c8cd4d91c45920163b696c1c59d8c410a870df81b544f22441e0a7d60bbce6f51d946a45c764e4af51b0473b7b8943ccdd109201597d6f5af17cbb92a87af24e1d2a7d10fe61264ff788303ca017d2a85019f1994", 0xec, 0x0, 0x1ff}, {&(0x7f0000001700)="ffd5a91e7f20f229a45bcc3807efc9befa149fa38593c465d8be61cff03024110b857c5df2", 0x25, 0x6, 0xffffffff00000000}, {&(0x7f0000001740)="2b547cbb16596c3bf4a146def8308cabf1b873df2d14ca07ff358d68bbdf37d3a8406672ed8ddb3641f150b1e9524588fac69910ed53d2c34a88467f7c3c41f9bb46cf7d17814532be960c3fc94d2cf05a62e44c08237b02f446129cdc19e098abf80bf90a3e103a74c29795c0a0d76206902a1fb368323776faeb2702e86127113bebff5840c88976d14d6f133cef788840f57261c9e27c49699726de25012cef992c4b9857c892949fbb1f0fa047d76c1db12802b47d22e4be70591e29", 0xbe, 0x9, 0xffff}], 0xa0000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10400, 0x0) ioctl$KVM_SET_PIT2(r4, 0x4070aea0, &(0x7f0000000180)={[{0x8000, 0x10001, 0x3, 0x4, 0x200, 0x0, 0x7, 0xfffffffffffffff9, 0x9, 0x7f, 0xfffffffeffffffff, 0x7, 0x4}, {0x0, 0x8, 0x8, 0x200, 0x0, 0x1, 0x9, 0x6, 0x4668, 0x7b7, 0x1ff, 0x4, 0x1}, {0x7fffffff, 0x9, 0x5, 0xf44c, 0x1, 0x3, 0x3, 0xb9, 0x6, 0x3, 0x5, 0x9a91, 0xb8b}], 0x1}) getsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000001a80)={0x0, 0x48, "d86d890f0f9f2149d40ac6e04bb92b9d9a80c638bcfc5e71934a7563bc3e04b8839251cbb1159dbfd45b1468f35693970bb68325b85a3aa3781b0ca5f2a93fe81262b4a86cb836c0"}, &(0x7f0000001b00)=0x50) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000001b40)={r6, 0x1}, &(0x7f0000001b80)=0x8) sendmsg$can_bcm(r4, &(0x7f0000001a00)={&(0x7f00000005c0)={0x1d, r5}, 0x10, &(0x7f00000019c0)={&(0x7f0000001940)={0x6, 0x201, 0x8001, {0x0, 0x2710}, {}, {0x4, 0xbc, 0x5, 0x6}, 0x1, @can={{0x2, 0x6, 0x1ff, 0x2}, 0x4, 0x3, 0x0, 0x0, "b995ce3654322578"}}, 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x20008010) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:08 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800030000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbe000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 792.829046][ T2496] buffer_io_error: 18 callbacks suppressed [ 792.829058][ T2496] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 792.843557][ T2496] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 792.852045][ T2496] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 792.860483][ T2496] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 792.868940][ T2496] Buffer I/O error on dev loop0, logical block 4, lost async page write 12:39:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10a1a9, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 792.877397][ T2496] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 792.885863][ T2496] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 792.896829][ T2496] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 792.905285][ T2496] Buffer I/O error on dev loop0, logical block 8, lost async page write 12:39:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 792.946021][ T2495] Buffer I/O error on dev loop0, logical block 9, lost async page write 12:39:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$evdev(0xffffffffffffffff, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:08 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800050000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10a74f, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff0900}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x400000) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x30, 0x7ace7ef2b54b4a42, @in={0x2, 0x4e20, @multicast2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10a78c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:08 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800060000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff0b00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xbffff, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101200, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0xa4, 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$evdev(0xffffffffffffffff, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x114) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000000c0)={0xf004, &(0x7f0000000040), 0xa, r1, 0x6}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xdfa) 12:39:08 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800070000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10a791, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff0f00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08003f0000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10a98d, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$evdev(0xffffffffffffffff, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff3f0b}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000040)={[], 0x7, 0x73b582dd, 0xffff, 0x0, 0x7, 0xf001, 0x100000, [], 0xdd}) kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0xffffffffffffffff) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:09 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800400000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffbffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffff9e6, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b0010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1b0}, 0x1, 0x0, 0x0, 0x80}, 0x4008810) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) read(r0, &(0x7f0000000340)=""/242, 0xf2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') 12:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10b197, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:09 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800ff0000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10b29c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000800000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10bd95, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x95, 0x4, 0xfffffffffffffffd, "cc05953e247af3a89f643278c357e964", "b9e077ea8338c9982a9f83656bbc9d1f7b81dce64f369becae4b53edfdca343ff08fdf21783dccd7d071ff7e73d7dccbfe6cd9720c9095c3612150c799d6fe07c7c241acc2e4d45521a0063a43f54c7a9f4df16f78c8be120c20dc70ec744f0c29e72be6df6cfe8656034e7e132ac2a844b51dc61c04ae85f218da6e38857f3c"}, 0x95, 0x1) 12:39:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x21fffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10bd96, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08a0008000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3e0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x200000000000000) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x191800) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000040)={0x800, 0x57dcdc9c, 0x7}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10bea3, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3ffffffffffe}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000001000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10bea9, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = getpgrp(0x0) waitid(0x1, r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x340, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10) r2 = request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/dev/autofs\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r2) 12:39:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x75a200000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000002000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x80) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc67a0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x405aa600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10c353, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:11 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000003000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000180)=0x0) ptrace$getsig(0x4202, r0, 0x0, &(0x7f00000001c0)) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = accept4(r1, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x7ff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140)={r3, 0xf6ca}, 0x8) 12:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x605aa600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000004000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10c456, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/10) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x400200) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000080)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100000000, 0x40000) 12:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x8000a0ffffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000005000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x8000039, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xb0189600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10c78c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) write$evdev(r1, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000006000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8844}, 0x8000) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xc9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xb0479000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10cd9c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) write$evdev(r1, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000007000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xca000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x948, 0x40) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=""/67, &(0x7f0000000100)=0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xc7, "0aeb351753965ef88a4510c71ab6ca81cb4e826b5e1357e9b93e026261ce07c6f84c96d4267a2f83de0631037d95eb020e8d5d696d71ff3cf22b61152d03100d4b7095e3835d8362072fec94685d1d07b14bacca8fa900182618e2c348762aa6d0064e1f35cb83dcff23f8b708a5db97ec941621ede32f7683cba5565a99b74f9a70e9a31b966c87c08136fa28c2391f007b2ff87d31e62d54643fafc5f9f5b41420082c0c969c52b1665895e2306a91bf5b5c20c3b30f697e4d4f94db605e22a770ab5cc23bcd"}, &(0x7f0000000340)=0xcf) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000380)={r2, 0x4, 0xd2, "39496ae0120fc8dd8d2a5ea949b1049edd18c52553a2cb56ffff5935711e55a8916f3d19ff738f6400fe10651cd0928d70d2099d35592a81883e35dacf51f02e2996759b324a4b2e0735ad410d536c1a2215f524be7e9fae6bc62796dc0de5d10c67ba4305239cf664c749fc250994b2f73501e440426cace8e9edb15a8b184becaa624558ee2829d9f6fcd9b7f0da375ee53307a97207b08561587788adbee41cb90401a0067408c85aee1951b950fddee94d744cb8f0b2b1ab21793bfdd75de9e5d36fca98837ff0b0c03afb8214d69d25"}, 0xda) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000140)="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", 0xfb) 12:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xc0189600000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000008000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) write$evdev(r1, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10d29f, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10d79c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xc0479000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:12 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="080000003f000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x20) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xd0ffbf00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:13 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000040000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000080)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x1000, &(0x7f0000000600)="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"}) [ 798.017892][ T2495] print_req_error: 20 callbacks suppressed [ 798.017904][ T2495] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10e29a, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xf074a200000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x2, 0x20, 0x5, 0x0, 0x9, 0x80, 0x8, 0x0, 0x8, 0x8000, 0x5, 0x4, 0xfffffffffffffff8, 0x3f, 0xfff, 0x2, 0x3, 0x6, 0x3, 0x9, 0x800, 0x2, 0x0, 0x6, 0x3, 0x8, 0x3, 0xec, 0x6, 0x3f, 0x5, 0x3, 0x6, 0x3, 0x400, 0x0, 0x3f, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x7, 0xee71, 0x8, 0xffffffffffffffff, 0x41, 0x3}, 0xffffffffffffffff, 0x4, r0, 0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000000)="4a3efca3f8cdff5b47eeda4be793dbee22cd3c058f46e06017fb30eb7271abb74d70db8979590cacda9667161323c39d8392b54f4cfa7dd2beed100dedb5e8baa76c98093b4f7e06df2e0799ae8b11da76d9a8d65691553f9ef13f3b781a94bbe29d938a938b5cfd1d889612258eb623d3f742eb1ff214a870487b4d01b6088d0cc89b04ab1887d0ca9515140dd9002ab3947692c890952173cea84293186c974c4e3a3bf068958c1a60fc2690f64695b971b542898eea73610f92b75495d338", 0xc0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:13 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08008000a0000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x100000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10e581, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xce000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10e595, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:13 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000ff000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000008006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x200000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x86010, r0, 0x180000000) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xcf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10e88c, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x300000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08ffffffffa00080006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 799.206751][ T2495] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3f00000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = dup(r0) write$evdev(r1, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 1: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0xfffffffffffffffe, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000000c0)={0x7002, 0xd000, 0x334e, 0x1}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) r3 = gettid() setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e20, 0x7, @ipv4={[], [], @multicast2}, 0x2}, @in6={0xa, 0x4e24, 0x5d, @mcast1, 0x80}], 0x48) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x1, r3}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:14 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000016000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10f19a, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x3f50a30900000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = dup(r0) write$evdev(r1, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x3) 12:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10f281, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x4000000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000026000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = dup(r0) write$evdev(r1, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) sendto$unix(r0, &(0x7f0000000080)="7a5356735f5e85f52a50ca4a521fce1f012fdf22", 0x14, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10f48f, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x5659600700000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000036000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:15 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x60480, 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0xffffffe0, 0xfa00, @id_resuseaddr={&(0x7f00000001c0)}}, 0x10000004c) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10f753, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x7fe0bffe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000046000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10fd8a, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x7ff0bffe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3, 0x2000) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000061c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f00000062c0)=0xe8) nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000040)) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000006380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000006340)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000095825f942d00", @ANYRES16=r1, @ANYBLOB="080126bd7000fddbdf2502000000080001004e220000080001004e240000080002000a00000008000b00", @ANYRES32=r2], 0x34}, 0x1, 0x0, 0x0, 0x24004080}, 0x8000) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:15 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000056000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x10fda5, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 800.661666][ T2496] print_req_error: I/O error, dev loop0, sector 248 flags 0 [ 800.687223][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xa0670c0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x110000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)=0x100000001) kexec_load(0x3, 0x1, &(0x7f00000005c0)=[{0x0, 0xfffffffffffffdf7, 0xfffffffffffffff7, 0x3e0000}], 0x320000) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xc683, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:16 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000066000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfeffffffff3f0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 801.137440][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 801.144908][ T2496] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 801.153298][ T2496] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 801.160920][ T2496] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 801.169485][ T2496] print_req_error: I/O error, dev loop0, sector 16 flags 801 [ 801.177116][ T2496] Buffer I/O error on dev loop0, logical block 2, lost async page write 12:39:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff03c0fe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x111000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) [ 801.185583][ T2496] print_req_error: I/O error, dev loop0, sector 24 flags 801 [ 801.192969][ T2496] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 801.201611][ T2496] print_req_error: I/O error, dev loop0, sector 32 flags 801 [ 801.209070][ T2496] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 801.217660][ T2496] print_req_error: I/O error, dev loop0, sector 40 flags 801 [ 801.225480][ T2496] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 801.255667][ T2496] Buffer I/O error on dev loop0, logical block 6, lost async page write 12:39:16 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000076000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x18080000, 0x80) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000040)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0x3f, 0x7, 0x4, 0x9, 0xae, 0x80d, 0x8, 0x4393, 0x7, 0xfffffffffffffff8, 0x7, 0x3}, {0x8000, 0x9, 0x1, 0x3ff, 0x0, 0x6, 0xfffffffffffffffc, 0x80000000, 0x0, 0x5, 0x0, 0x2, 0x3}, {0x8, 0x5, 0x80000001, 0x8001, 0x9, 0x80000000, 0x9, 0xffffffff, 0x7f, 0x6, 0x6, 0x7, 0x3}], 0x6}) 12:39:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x112000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff0f000000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x80000001, 0x8000000000000e8, &(0x7f00000005c0)=[{0x0, 0x0, 0xf275, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:16 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000086000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x113000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xff0fe0fe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x114000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:17 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0xc, 0x5ca, 0x9, 0x6, 0xda56}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f00000000c0)) kexec_load(0xfff, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x1000000000800, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x3) modify_ldt$write2(0x11, &(0x7f0000000080)={0x8, 0x20100800, 0x400, 0x3ff, 0x80000000, 0xffffffffffffffff, 0x10b, 0x7f, 0x1, 0x9}, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000100)={0x9, 0x4, 0x0, 'queue1\x00', 0x3}) 12:39:17 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000003f6000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x115000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffcfffbf00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xdd, 0x400000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 12:39:17 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000406000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x116000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xfffb090000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000ff6000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xd9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x117000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff090000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xffffffffffffff29) 12:39:17 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08008000a0ffffffff6000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x118000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) time(&(0x7f0000000000)) 12:39:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff0b0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xda000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x119000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:18 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800020000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 803.164961][ T2496] print_req_error: 8 callbacks suppressed [ 803.164971][ T2496] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 803.178651][ T2496] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 803.187333][ T2496] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 803.195062][ T2496] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 803.203462][ T2496] print_req_error: I/O error, dev loop0, sector 16 flags 801 12:39:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 803.211318][ T2496] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 803.219828][ T2496] print_req_error: I/O error, dev loop0, sector 24 flags 801 [ 803.228231][ T2496] print_req_error: I/O error, dev loop0, sector 32 flags 801 [ 803.235747][ T2496] print_req_error: I/O error, dev loop0, sector 40 flags 801 [ 803.243180][ T2496] print_req_error: I/O error, dev loop0, sector 48 flags 801 [ 803.251059][ T2496] print_req_error: I/O error, dev loop0, sector 56 flags 801 [ 803.258568][ T2496] print_req_error: I/O error, dev loop0, sector 64 flags 801 [ 803.266392][ T2496] print_req_error: I/O error, dev loop0, sector 72 flags 801 12:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x11a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xaac6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x14000, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000040)="ea3314") 12:39:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff0f0000000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:18 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800030000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x11b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x20500, 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:ssh_exec_t:s0\x00', 0x20, 0x3) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000800)={0x0, 0x100, 0x3, 0x8}, &(0x7f0000000840)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000880)={r2, 0x6}, &(0x7f00000008c0)=0x8) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_ifreq(r3, 0x89b7, &(0x7f0000000040)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="6b12075f3eb435e9f90d80b9886a1cc82be7cddce40819334e9b45a166ef9017"}) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x1, 0xfffffffffffffff8}]}, 0xc, 0x2) 12:39:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffff3f0b00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800040000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x11c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffbffe00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x11d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x800) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x100) 12:39:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800050000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xde000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffff1f02000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam\x00', 0x20}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffb}) tkill(r1, 0x4) ptrace$setregset(0x4209, r1, 0x20000004, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x1, 0x60) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000140)={0x8, 0x18, [0xffffffffffffff81, 0x7, 0x5, 0x0, 0x3, 0xffffffff]}) 12:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x11e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffffbf00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xdf000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800060000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:19 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000100)=0x7, 0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x4}, 0x0, 0x0, 0x0, 0x8}, r1, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2b, 0x4, 0x0, {0x6, 0x2000000000000000, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 12:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x11f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800070000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffffff00000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x120000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xf7d8, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xfffffffffffffffc) 12:39:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffffffa0008000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800080000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x121000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0xffffffffffffffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/186) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000300000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x122000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x57, 0x0, 0x2, {0xf9, 0x9}, {0x6, 0xffffffff}, @ramp={0x3, 0x7bca, {0x5, 0x1, 0x800, 0x2}}}) 12:39:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000500000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x123000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000600000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x32b, 0x0, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x2) 12:39:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x124000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x300}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000700000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0xe5b6}], 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)={{0x8, 0x1000}, {0x335d, 0x9}, 0xfffffffffffffeff, 0x2, 0x5}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82240, 0x180) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x2, 0x3000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000280)={r2, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)=0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r4, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x29}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000040}, 0x4001) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x400, &(0x7f0000000300)=""/130) 12:39:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x125000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3e00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x80) r1 = fcntl$getown(r0, 0x9) sched_getattr(r1, &(0x7f0000000180), 0x30, 0x0) prctl$PR_SVE_GET_VL(0x33, 0xd6a7) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000040)={0x1, 0xfffffffeffffffff, 0x1, 0x0, 0x3ff, 0x2, 0x7, 0xee}, &(0x7f0000000080)={0x43, 0x3, 0x100000001, 0x8, 0xfffffffffffffec2, 0x0, 0x4, 0x7}, &(0x7f00000000c0)={0x1, 0x19, 0x4ad6cd4b, 0x101, 0x7fffffff, 0x4, 0x101, 0x8}, &(0x7f0000000140)={r2, r3/1000+10000}) bind$tipc(r0, 0x0, 0x0) 12:39:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800003f00000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x126000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3f00}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800004000000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000000)='vmnet1bdev\x00', 0xffffffffffffffff}, 0x30) timer_create(0x1, &(0x7f0000000080)={0x0, 0xe, 0x7, @tid=r1}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x127000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x4000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="080000ff00000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x128000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x75a2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x10000) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0xfd, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0xff, 0x5}) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x8001, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x10000) 12:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x129000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xff0f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xe9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:22 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000008000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x12a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xea000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x9fbff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x5, 0x4) 12:39:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xeb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800a00080000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 807.927631][ T2496] buffer_io_error: 17 callbacks suppressed [ 807.927644][ T2496] Buffer I/O error on dev loop0, logical block 79, lost async page write 12:39:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x12b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x9ffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x15, 0x2ba, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xec000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000010000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) [ 808.297119][ T2496] print_req_error: 18 callbacks suppressed [ 808.297129][ T2496] print_req_error: I/O error, dev loop0, sector 632 flags 801 [ 808.311160][ T2496] Buffer I/O error on dev loop0, logical block 79, lost async page write 12:39:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xbffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x58, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x12c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xed000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xc67a0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:23 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000020000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:23 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x204080, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000080)={'erspan0\x00', @ifru_hwaddr}) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000000)={0x3, 0x3, @stop_pts=0xfffffffffffff001}) 12:39:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xee000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) [ 808.716235][ T2495] print_req_error: I/O error, dev loop0, sector 632 flags 0 [ 808.728297][ T2495] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:39:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x12d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xfffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x12e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r2 = semget(0x2, 0x1, 0x480) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) semtimedop(r2, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={r3, r4+30000000}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+30000}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:24 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000030000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xef000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x12f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:24 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000040000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf0000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) bind$isdn(r0, &(0x7f0000000040)={0x22, 0x5, 0xfffffffffffffffe, 0x8b, 0x100000001}, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0x42000) kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x160000) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf1000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x130000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:24 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000050000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x405aa6}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x200600) r2 = geteuid() getgroups(0x1, &(0x7f00000000c0)=[0x0]) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000240)={0x0, @reserved}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x80, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c67726f757012705669", @ANYRESDEC=r3, @ANYBLOB=',allow_other,default_permissions,allow_other,blksize=0x0000000000000400,allow_other,default_permissions,max_read=0x00000000000001ff,default_permissions,blksize=0x0000000000001800,allow_other,\x00']) 12:39:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf2000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x131000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:25 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000060000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x605aa6}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x418400, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000580)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000002700)={0x0, 0x32, "c4f1771d73c1650734e8a7eaa94763a2dc3fc038d59d027b0aead3ff2393f330897421eadbc4135dfe16162d756762c437cb"}, &(0x7f0000002740)=0x3a) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000002780)={r2, 0x8ce}, &(0x7f00000027c0)=0x8) write(r0, &(0x7f0000001700)="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", 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000002800)={0x6, 0x7, 0x3, 0x24, 0x18, 0x4, 0x9, 0x4, 0x80, 0x10001}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000, 0x9, &(0x7f0000001600)=[{&(0x7f0000000080)="3f126c7b7984251a4ee9a4885cba1bf79ede3e87fb63e226555086b8bb996f2cee1d61e3656698b87babcb342b6614aa764dac01cdf858b6b609c0b2c80118b6fecf65b46a57bccdd78c0ef9004601b6c1f772e2a506fd8ebcf1403c4864fcbc0372071543b37b765faada40e8b70700b36e815548d3c34f21fc39533d4d12acf260a3a57db7ad918684fc6c60ecdf2dfff90b14e1bd2cb363fb7bb41dd4989228dff8554f0f633c0c73327f5bbd3de091500c00a2d63e42acaee1ed161bd5fdcfade41da2e7f62f67eea134", 0xcc}, {&(0x7f0000000180)="aa4140c2a1eccb696fc72379a421c3d2ae37a3616cb8f99e31cac87310f6df8ce6a14eb5c1d516754b833afafd172045b4ef0f3ffa3150a1d69e76fbe3da9572d00e32b9f51c2261aa217fb6e1a33589dd78cb999de0a866e44047a40ae3df1658153cdc3a2ce55f3bbbf214543f8fbf95ea8466b5ee77c9c826e2ccc49a69819130e58955231f773eef222946dc4d39afe1a3fe35", 0x95, 0x10001}, {&(0x7f0000000240)="49d68329c6a865604152e937b17737b368470efbbdd7b90f421e7587e41555c4430c3ce9b9c912cd19e8b385507f3d4b085a77ce7a613836e78a35f736406dcf28a938155dfecd1dce6b651b1b9cf2a6f6f3e1a13a488908151621d6b7cefec11a", 0x61}, {&(0x7f00000002c0)="75a24cd27a8a5350b37bce2e9767a8c10cfdfb2455e48223243f21e92751f018d7b02dcdd18be2c279b1ead7099d6692aba223bab4c5188be199698662c193ffbf7e73", 0x43}, {&(0x7f0000000340)="39846cac031c3dd57de8e0f7eef1d212516c90552c1f7d61791009496761066a85960165732f833f97627a58ce19ed1d85d6fbd03a5d9a75f8ae0bd606e4fb1655ffd83fc7a8d4f90a19c7241ad53413c3c9538699726708b13b387fc22c3ceac27f24102b767e4f4b5bee856069140754748dc2d0f4e777a09a142429f87794a687a19fdc13e8fa87064034beebff7ecb091d2a7623d299f4f243e0d63dedec90d35d78f70f541c221b5060284c3cb464896a854169536ee864c05f64c0d9b17a6f51a83fe10339b1a88a4c5cc75d8c5a4bcba43dc11a", 0xd7, 0x76}, {&(0x7f0000000440)="4c645d634a570bea0bb11d32ce7a54c0164b4a157499b83e90b294c66ffe3c517d912882a0f3640f129e0bcbf07d18089a", 0x31, 0x40}, {&(0x7f0000000480)="0aa4c99c287573be248af35ee946d58a06e9d54d03551f476c17dbbeb3be39947a9a", 0x22, 0xffff}, {&(0x7f00000004c0)="10fb1170dc89a149d6f32ed04b1cfba072c953b0ebbdfdaef84e00ac61a9fbec7eb3afadbc1e18951b4178c6fcac0970663271649f9b7e44f553986d0a62048c981ac94365357ea6bb285c1dfcaac1161a030a24cee38e6e6dcca27c001dd8d6e666e1e355538cb75967b494f6339fcae1", 0x71, 0xffffffff}, {&(0x7f0000000600)="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", 0x1000}], 0x108008, 0x0) 12:39:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x132000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf3000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x8000a0}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000070000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x133000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xb01896}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x5, 0x70, 0x5fa1, 0x0, 0xd6, 0x2, 0x0, 0xfffffffffffffffc, 0x10000, 0xc, 0x1, 0x6, 0x3ff, 0x7495, 0x6, 0x3, 0x4, 0xffff, 0x9, 0x3, 0xbe1a, 0x80000001, 0x80000000, 0x10001, 0x45, 0x80000001, 0x9, 0x9, 0x3, 0x0, 0x4, 0x4, 0x3, 0x1000, 0x5, 0x5, 0x3, 0x3, 0x0, 0x81, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40, 0x4, 0x100000001, 0x1, 0x7, 0x7, 0xcc}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000240)={r1, 0x3}) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf4000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000080000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xb04790}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x134000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20200, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xcd) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) ioprio_get$pid(0x3, r1) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf5000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xc01896}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000003f0000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x135000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x136000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xc04790}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000400000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf6000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf7000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xd0ffbf}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x137000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:26 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800008000a00000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r1, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0xe7fe14d6d6e2e657) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xf074a2}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf8000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x138000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:26 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000ff0000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={0x77359400}, 0x10) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x100}, 0x8) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xf9000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c99ffc, 0x3e0003}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001d00)={&(0x7f0000000200)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000280)="d30fd537b4a4bed1b747322b870daf23dda4e7119d29b8a638a936c5ecb3c899c904703b2eb35345f67681b021380164a93e2013698947e0b73f30c90f3902ab6f1c257808905ceeccda43eb97c95d0dc9017d1a8cc7e946d1fa9b87555b3a0fb459457999012e89ea850d9e8ee11e4f4ffa29c9960ec71dc398cd577f155be468076e7dabd8b57d74c8fd367367e11555675e538d40c27bdad6d358939eb89e424512cebb", 0xa5}, {&(0x7f0000000340)="9cd943d1276a49d6f5558ab983daa542cc5f12695019869272b80068404826c38ee48086b98588be744f0258ee486d82b2bbd7c2736afe87b087037ca71b3a029e5e7069a223b8dd69ffd6dfd20e1d759062fafbac7b4a4fc7ed51b5ec9bd6ceca11bfa7bc9598ccacd657657b8ec65706cc8a49c6978f5e8ac36196efa381289dc3ca639805b6bcd97712e4e2b9258ccb143edba63ae7fd443979a6f8b8671ab9b172263eab2d7de53eb0f610a2c1267e0637006be7e5a1ff1e9ae28e691598bccb5a212608e22a5b1b9501c7b79d85b35cf99c1d5b8deafb19061d", 0xdc}, {&(0x7f0000000440)="1cdf1236981445bd099e5f75d3f098d6cebf253480202460027639489c7fd536d052287fdb8bfed77e70d16453e4dbdc6ef7be16830e9eed5c9e359170a100397b0a7b777d2e91b79403de3c12d0c8252c94b56a78a2769af1aa3582180f0791ad35f57e885d5e3686e55cec7064adecf50be4bac9eb3328c120411dfe65a73410b87c799e5850663175cc7e6a55dfe5b5cf98312a357c6f135d90bc6d85c844842801b6ce868d7b11b5253154cae2be2b849c86bac11b421f7b39919d9731ef1d", 0xc1}, {&(0x7f0000000600)="6419a1e11f747d1cf3a2c2588bf7cf89977a4c51008cba75659bcf73786eb131be0d1b0bc345e62f380b46104e41f39047d4eea2ac2ecb57c4b51afd93fb350c1ad51fc037291b2c6fa68e01795b0fdb45d116f12d25c4d87d644d87a2a90310cc497d322a03f453d463691b08caedb0d536c60e8cd7b54afd541365c6f3045ca5652dee3d56c8fe277f691efd14d8d3f7928a76209b725ce7eb854599f591ebdddf838cef5809890f58d2826b84084d122716fd78ccf72aa79ced8989ce4eb6e13334091e17aafaa1d80bea016fcae5c9b8dfe2d9ea7534bfb27ca3", 0xdc}, {&(0x7f0000000540)="1febb0be3be36260e8aab5f24af63fffc4293884152b99b9a2d87005e55d8af40628de7af9ac1f511863abb5a67f7fce3d88e063f1a80dc633088e7991239cb677462c1318fdd7e320f1f461277a45", 0x4f}, {&(0x7f0000000700)="559d7a9587a77c1fdb8d6fae110c56294c8baa7c2441af3a7ddaa7c8a83911b355bc1c0470a3c225280ea9ba2bcd361af1ff93d66bd6bbe81f257405a9e0037cb32f1f31489ed7e13d7901d8d3250ed6dd19f069a76db711b5f1981923eda17901f318ea575ce544484085fe0f4b70e73d5093147f11464c80c15305be2a110c0240860328a0a509e58fa2d49403e4d911ff956d4a304b0f83785b8148e5d2c5802191a853a91b9ba21286f47de748145b7074e6b726880488d7a8382905c7c1624bb0e619e478f8b1469f7febbe8822886f0bfa88852907865dfaf04144bef15b063c19ed3d507e0ae0c55efbf86d96d8479566758c3088", 0xf8}, {&(0x7f0000000800)="60bccee1acc39c26758d9350a5b938e54f7bfcc78086d1ae30bbb8fb47019ab9f34a97c718458eab25b5b5df476b", 0x2e}], 0x7, &(0x7f00000008c0)=[{0xa8, 0x117, 0x10001, "65e88099a089b565b16643001f91e13b56b8939ee2b6db9f1198bef2651878d7e2284ec743cb646ce3c57fc61f35ff326d2bb285934f30087699c12a420583cc8cd24abae10eeb9141fe2e7db9d8588eaa990764fd08cff65b8a346a8af77c75097200986dc245d91aa0208b6d23942e9f22e93f4f86a48a37f26e5ee77051d09a05c10f9bcd51dfdb9ed1901059130e748acd719eca"}, {0x98, 0x10f, 0xffffffff9e2d49ae, "39d1b03886e7d7f2b22cc6f410e7c93ef825f226652553c4e8df2989f4e23529e1c12675bb207fdcaa4ce3048ce8c9afdbba916bff7f89d6763e0598042e254f402500059cfc47e95d916c4ce6f743e850c0a5923e3bca76ce188bfd11ec774a490d7e8d46dfe958b59525de79a4365700fb91c47e40d703b1d22fb7df0de3dcb0d4f5ae13547a0c"}, {0x1010, 0x11b, 0x6, "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"}, {0x48, 0x1ff, 0x400, "78a2629d8dfe9c841d76bb6d61d12fa73fd265ee8a62115b90d64e0fe5840b30aab0067c73b926b5ac4068d2be7ab8973269"}, {0xf0, 0x116, 0x6, "ddf5e6c710525bc296dad262b6d8cecd39b245df201d11de4bf7b387ca76b40037bab5979ca0a54dfcea8cadc2c2628502e7606921f55aee9113c9d2f18c53ad695e579ae2fc8b9b9511178c6d0ab12ed0fd0fd4c45d49eb8a2e3efee5af840e52988bdfd4fdb80205c94e2e01e28efd2a6aa1fb8ddb177de8b85947af8fb0bf7105197ebae18354d7a766b38b0c2468929ee8c37e955526531545f57f1725cf546654aacf3fd57b3e02ec6592be8fc1a38a1168ebf8c9d9c45b564ceba456f12cfb220616a08489857b80845ecb7d6b6f97a5f6213da3331c"}, {0xb8, 0x11f, 0x7, "e789d01a5209185583e0e4df346e4ae9819ed893bb3d28e7b82ddbedffa8422036e54784dbe25a3c8ca4912777e0ff7172a76d3ce6c8ba3e383aefe54194b1d027a3cdf967a8aceb970301819a0e7faac9c291cf025fdc996fdd41d7e18231965a117e78f4b2e999df43675c6cccbc3f520ff733bea90f45661c9cd93f8e8af70e24f9d05a37f940e5d7f4aba9b41db60e956a84b1914c442f435ac3125d70493c83a5ecc7a0"}, {0x20, 0xff, 0x7f, "77886a87f56e3831016c4b71"}, {0xb0, 0x105, 0x7f, "81bc03a6a3feb414f02b996ce125e279c14f32495c8e6736331ea17db4affc82dbad9b9e9a146e1f8628feaa1386870e9ba973932457909f9decb8465be0b1e180b347101e11bf41a95eaccb1f30ee4aad0aad4b16cca7ba3927b72057f98431fe4b6271c3da3d5ec2f836d9f6c2385861aecf9e04aa58a2d30f346cd96be630f9a59cc015e9d48336162d300ac239833aa6e8858dcab92fb045364af6b80c"}], 0x1410}, 0x4000) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x20200) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000100)={'broute\x00', 0x0, 0x4, 0x4c, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000080)=""/76}, &(0x7f0000000180)=0x78) 12:39:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x139000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:27 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="080000000000000000ff00b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfa000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x401, 0x410000) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffff, 0x200) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 12:39:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:27 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000200000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x13a000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfb000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x2000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x9d, &(0x7f00000005c0)=[{0x0, 0xfeb3, 0x56c9a000, 0x3e0000}], 0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x802, 0x0) r2 = dup(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r2, 0xf, 0x1}, 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x40) socket$bt_rfcomm(0x1f, 0x1, 0x3) 12:39:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x13b000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:28 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000300000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfc000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 1: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000280)=0x80) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10000}}, [0x7, 0xc882209, 0x4, 0x2005, 0x401, 0x6, 0x3, 0x2, 0x5, 0x8, 0x3, 0x6, 0x7, 0x8000, 0xa08]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000400)={0xffff, 0x8000, 0x2, 0x80000001, r1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 12:39:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfd000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000400000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x13c000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfe000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="79b9ac3e1cd5edc4f42cb0487a7993b47bbd9b6f0241c0565443be132bb0cd3e99f14d1a37f88f347b37bd69c57a89bec9e09ae6f901eae7f2873de4632a5f366469cc25c585e88e3751b98ac5253d26756bc58e53391bb9d250b1276cc4c711699cea9c92ee6284a931eb0d509e0fad4ff375a2325be3b6f7b37e4de89d2096a2e95a86c7c1a1f3dafe3d7880ad60b5c49af94bed65e96ed45d458f874beb9ac72cf872f1a063bbdfd13a632c0f0527c79985f1f8a1e6bce97c8c07cbc4c8647e867a34c0119770976bbbcbe44d060be5949db6470418700b9cb522aa8f66fb4dc2", 0xe2, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$link(0x8, r0, r1) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x13d000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000500000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xff000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) fcntl$setsig(r0, 0xa, 0x2f) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x4, 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x13e000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:28 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000600000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x7605956}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x13f000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:29 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x80, 0x0, 0x4, 0x0, 0x0, 0x5b5bf83f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x7, 0x70, 0x3, 0x6, 0x2b, 0xd49000000000000, 0x0, 0x10000, 0x800, 0x8, 0x1, 0x6e9, 0x4, 0x3ff, 0x7ff, 0x6, 0x7fff, 0x5, 0x7, 0x7fff, 0xb1, 0x7, 0x6, 0x3a47, 0x4, 0x2f, 0xfff, 0x2, 0x8001, 0xfff, 0x6, 0x80000001, 0x7fffffff, 0x7, 0x100000000, 0x8, 0x681, 0x80000000, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x400, 0x7, 0x4, 0x3, 0x7fffffff, 0x6d9, 0x5}) 12:39:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x9a3503f}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x140000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:29 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000700000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0xfffff, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0xb3fffff}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x141000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:29 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000800000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x12400, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x10000, 0x4, 0x10000, 0x6, 0x0, 0x9}}, 0x8) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 12:39:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3f000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:29 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000003000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x142000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000005000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3f50a309}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7f) 12:39:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x143000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x6b52, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x40000000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf05, 0x480040) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 12:39:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x144000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:30 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000006000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100100, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = dup(r1) write$evdev(r2, &(0x7f0000000240)=[{{}, 0x0, 0x0, 0x931}], 0x18) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "265bf7eea1595154", "efdbc1f14744fbca2dce5969d7ee88933e7942c6c11ba6010c28611ea0b199b2", "21df9f89", "81072796c1e607b6"}, 0x38) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x145000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = getpgid(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getgroups(0x3, &(0x7f0000000080)=[0xee00, 0xee00, 0xee01]) setregid(r1, r2) 12:39:30 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000007000000006000b7ee1b00040000817ee5646c39dac03f28d80f84ad8d00608403badf7e917bc18037263af09d65a6e7d016970be3bc0290e5d737f11be8c888f106f122983098c879470101610d9da33021d528c1370abff92e62ecd3bf9821bd5d9e349544156dd0816b7993e4595770e1ca83976748f06af1641a270e34271c7754909d6698da4fa8b7f6b10696c181d8e80a2298eb8b4205a0ae8a02805622de5cfec26b39aeb17af9a9ac2bb238a30575f7fe2c6223c31eb0a0603d1e812d8ffab80d5a10428b1107eb39"]) 12:39:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x100200, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20000) 12:39:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x146000, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) 12:39:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x56c9a000, 0x3e0000}], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="f352f7692a393205e55e04063b5bea1c6b4f9a68aad81b5162535095cf79dc6e764af67c748e98a465e6d89bcfedf9ca8c29d6d0c1bb0489a7b94e9642cbafa5786c5c863350094fe4047bca46900a758ddc9068623d55b75c14399f1d039849b972464411e4a007426c40d9663771cef0ac5165bb86f6d7e9e4225eb3418e5603f52932b91e179b0c5e0350a0d5ff34a3a7b1b50fdcfd3e0e9e61a59b2f941ca8d3a0afe69f8de48a48953e137dc6af5436ce", 0xb3) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) [ 1022.254314][ T1045] INFO: task syz-executor.3:9179 can't die for more than 143 seconds. [ 1022.262533][ T1045] syz-executor.3 R running task 28368 9179 8625 0x00004006 [ 1022.283563][ T1045] Call Trace: [ 1022.287440][ T1045] rcu_read_lock_sched_held+0x110/0x130 [ 1022.293264][ T1045] __alloc_pages_nodemask+0x658/0x900 [ 1022.305219][ T1045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.310762][ T1045] ? __alloc_pages_slowpath+0x25b0/0x25b0 [ 1022.323202][ T1045] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1022.330982][ T1045] alloc_pages_current+0x10f/0x210 [ 1022.343562][ T1045] ? set_memory_decrypted+0x9/0x10 [ 1022.350212][ T1045] ? arch_kexec_post_alloc_pages+0x9/0x10 [ 1022.361374][ T1045] kimage_alloc_pages+0x1e4/0x370 [ 1022.367805][ T1045] ? kimage_alloc_page+0x3a4/0x9f0 [ 1022.373032][ T1045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.386100][ T1045] kimage_alloc_page+0x2d8/0x9f0 [ 1022.391083][ T1045] kimage_load_segment+0x25d/0x740 [ 1022.400661][ T1045] do_kexec_load+0x41a/0x600 [ 1022.407829][ T1045] __x64_sys_kexec_load+0x1d5/0x260 [ 1022.413069][ T1045] do_syscall_64+0xfd/0x6a0 [ 1022.423087][ T1045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.431424][ T1045] RIP: 0033:0x4592c9 [ 1022.439784][ T1045] Code: Bad RIP value. [ 1022.443945][ T1045] RSP: 002b:00007f37a07ffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 1022.455816][ T1045] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004592c9 [ 1022.463901][ T1045] RDX: 00000000200005c0 RSI: 0000000000000010 RDI: 0000000000006b52 [ 1022.478810][ T1045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1022.488348][ T1045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37a08006d4 [ 1022.502556][ T1045] R13: 00000000004c5221 R14: 00000000004d92d8 R15: 00000000ffffffff [ 1022.512604][ T1045] [ 1022.512604][ T1045] Showing all locks held in the system: [ 1022.526850][ T1045] 1 lock held by khungtaskd/1045: [ 1022.531990][ T1045] #0: 00000000e81e9604 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1022.548220][ T1045] 1 lock held by rsyslogd/8486: [ 1022.553096][ T1045] #0: 00000000f275c98c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1022.568451][ T1045] 2 locks held by getty/8576: [ 1022.573157][ T1045] #0: 00000000246eebfd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.583651][ T1045] #1: 00000000d8e25575 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.600032][ T1045] 2 locks held by getty/8577: [ 1022.606324][ T1045] #0: 00000000b2f717be (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.620868][ T1045] #1: 00000000986aa904 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.632064][ T1045] 2 locks held by getty/8578: [ 1022.642186][ T1045] #0: 000000003213c38b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.652622][ T1045] #1: 00000000352eebb5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.670058][ T1045] 2 locks held by getty/8579: [ 1022.675499][ T1045] #0: 00000000d50f35ff (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.691884][ T1045] #1: 00000000c34f2598 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.702072][ T1045] 2 locks held by getty/8580: [ 1022.713967][ T1045] #0: 00000000a950fae3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.723893][ T1045] #1: 00000000bf5d2e20 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.740868][ T1045] 2 locks held by getty/8581: [ 1022.746062][ T1045] #0: 000000001075620e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.761675][ T1045] #1: 00000000b85496e4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.771864][ T1045] 2 locks held by getty/8582: [ 1022.783016][ T1045] #0: 00000000c6b85cc1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1022.792773][ T1045] #1: 0000000088c4c3c6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1022.809086][ T1045] 1 lock held by syz-executor.3/9179: [ 1022.815920][ T1045] [ 1022.818260][ T1045] ============================================= [ 1022.818260][ T1045] [ 1022.832156][ T1045] NMI backtrace for cpu 1 [ 1022.836592][ T1045] CPU: 1 PID: 1045 Comm: khungtaskd Not tainted 5.2.0-rc5-next-20190620 #19 [ 1022.845259][ T1045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.855317][ T1045] Call Trace: [ 1022.858614][ T1045] dump_stack+0x172/0x1f0 [ 1022.862954][ T1045] nmi_cpu_backtrace.cold+0x70/0xb2 [ 1022.871466][ T1045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.877898][ T1045] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1022.883538][ T1045] nmi_trigger_cpumask_backtrace+0x22f/0x27f [ 1022.889545][ T1045] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1022.895435][ T1045] watchdog+0xc54/0x1320 [ 1022.899680][ T1045] kthread+0x361/0x430 [ 1022.903928][ T1045] ? reset_hung_task_detector+0x30/0x30 [ 1022.909653][ T1045] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1022.915891][ T1045] ret_from_fork+0x24/0x30 [ 1022.920515][ T1045] Sending NMI from CPU 1 to CPUs 0: [ 1022.926017][ C0] NMI backtrace for cpu 0 [ 1022.926023][ C0] CPU: 0 PID: 9179 Comm: syz-executor.3 Not tainted 5.2.0-rc5-next-20190620 #19 [ 1022.926028][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.926032][ C0] RIP: 0010:write_comp_data+0x9/0x70 [ 1022.926042][ C0] Code: 12 00 00 8b 80 f4 12 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 65 4c 8b 04 25 c0 fd 01 00 <65> 8b 05 98 b5 90 7e a9 00 01 1f 00 75 51 41 8b 80 f0 12 00 00 83 [ 1022.926046][ C0] RSP: 0018:ffff88804f837d78 EFLAGS: 00000202 [ 1022.926053][ C0] RAX: 0000000000040000 RBX: 0000000051da3008 RCX: ffffffff8168678d [ 1022.926058][ C0] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000007 [ 1022.926063][ C0] RBP: ffff88804f837d80 R08: ffff88808c8564c0 R09: fffff94000121b79 [ 1022.926067][ C0] R10: fffff94000121b78 R11: ffffea000090dbc7 R12: ffff88805b5e6558 [ 1022.926072][ C0] R13: 0000000000000008 R14: 00000000010a2000 R15: dffffc0000000000 [ 1022.926077][ C0] FS: 00007f37a0800700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1022.926081][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1022.926086][ C0] CR2: ffffffffff600400 CR3: 00000000a5ef6000 CR4: 00000000001406f0 [ 1022.926090][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1022.926095][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1022.926097][ C0] Call Trace: [ 1022.926101][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.926104][ C0] kimage_alloc_page+0x37d/0x9f0 [ 1022.926108][ C0] kimage_load_segment+0x25d/0x740 [ 1022.926111][ C0] do_kexec_load+0x41a/0x600 [ 1022.926114][ C0] __x64_sys_kexec_load+0x1d5/0x260 [ 1022.926117][ C0] do_syscall_64+0xfd/0x6a0 [ 1022.926121][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.926124][ C0] RIP: 0033:0x4592c9 [ 1022.926134][ C0] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1022.926137][ C0] RSP: 002b:00007f37a07ffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 1022.926145][ C0] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004592c9 [ 1022.926150][ C0] RDX: 00000000200005c0 RSI: 0000000000000010 RDI: 0000000000006b52 [ 1022.926155][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1022.926159][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37a08006d4 [ 1022.926164][ C0] R13: 00000000004c5221 R14: 00000000004d92d8 R15: 00000000ffffffff [ 1022.938747][ T1045] Kernel panic - not syncing: hung_task: blocked tasks [ 1023.181874][ T1045] CPU: 1 PID: 1045 Comm: khungtaskd Not tainted 5.2.0-rc5-next-20190620 #19 [ 1023.191120][ T1045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.201456][ T1045] Call Trace: [ 1023.204756][ T1045] dump_stack+0x172/0x1f0 [ 1023.209088][ T1045] panic+0x2dc/0x755 [ 1023.212976][ T1045] ? add_taint.cold+0x16/0x16 [ 1023.217669][ T1045] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1023.223300][ T1045] ? ___preempt_schedule+0x16/0x18 [ 1023.228409][ T1045] ? nmi_trigger_cpumask_backtrace+0x20f/0x27f [ 1023.234559][ T1045] ? nmi_trigger_cpumask_backtrace+0x240/0x27f [ 1023.240972][ T1045] ? nmi_trigger_cpumask_backtrace+0x24a/0x27f [ 1023.247476][ T1045] ? nmi_trigger_cpumask_backtrace+0x20f/0x27f [ 1023.253669][ T1045] watchdog+0xc65/0x1320 [ 1023.257928][ T1045] kthread+0x361/0x430 [ 1023.261992][ T1045] ? reset_hung_task_detector+0x30/0x30 [ 1023.267535][ T1045] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1023.273779][ T1045] ret_from_fork+0x24/0x30 [ 1023.279795][ T1045] Kernel Offset: disabled [ 1023.284209][ T1045] Rebooting in 86400 seconds..