[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.512673][ T26] audit: type=1800 audit(1569193370.050:25): pid=8686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.556604][ T26] audit: type=1800 audit(1569193370.060:26): pid=8686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.614019][ T26] audit: type=1800 audit(1569193370.060:27): pid=8686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. 2019/09/22 23:03:01 fuzzer started 2019/09/22 23:03:03 dialing manager at 10.128.0.26:41515 2019/09/22 23:03:03 syscalls: 2338 2019/09/22 23:03:03 code coverage: enabled 2019/09/22 23:03:03 comparison tracing: enabled 2019/09/22 23:03:03 extra coverage: extra coverage is not supported by the kernel 2019/09/22 23:03:03 setuid sandbox: enabled 2019/09/22 23:03:03 namespace sandbox: enabled 2019/09/22 23:03:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/22 23:03:03 fault injection: enabled 2019/09/22 23:03:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/22 23:03:03 net packet injection: enabled 2019/09/22 23:03:03 net device setup: enabled 23:05:14 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace(0x4207, r0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000040)={0x1, 0xa, 0x4, 0xf8865a7a3b8eaaa5, {}, {0x0, 0x0, 0x3, 0x1f, 0x7fffffff, 0x10000, "31398bd7"}, 0x3, 0x7, @fd=0xffffffffffffffff, 0x4}) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x101) socket(0x0, 0x6, 0x44c) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x10001, 0x48de76376b5f8146) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x2b}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x2, 0x6d08, 0x200, 0x5, 0x0, 0xe7, 0x9, 0x9, r4}, 0x20) r5 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x200000) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x9, 0x3ff, 0x290, 0x0, 0x0, 0x4, 0x200, 0xd, 0x7fff, 0xa37, 0x2, 0xe1, 0x0, 0x6, 0x0, 0xcf, 0x0, 0x8, 0x3, 0x5, 0x80000001, 0x2, 0x7, 0xfffffffffffffff9, 0x2, 0x3, 0x6, 0xe4, 0x19c, 0x10001, 0x401, 0x2, 0x3, 0x3, 0x4, 0x40, 0x0, 0xa973, 0x1, @perf_config_ext={0x5, 0x2}, 0x8a40, 0x1000, 0x7, 0x72410f7289014f2f, 0x10000, 0x3, 0xc5d3}, r5, 0x1, 0xffffffffffffffff, 0x7) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/nfsfs\x00') getpeername$inet6(r6, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000340)=0x1c) r7 = dup3(r2, 0xffffffffffffffff, 0xd39a265f389057e2) ioctl$KVM_KVMCLOCK_CTRL(r7, 0xaead) connect$caif(0xffffffffffffffff, &(0x7f0000000380), 0x18) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r8, 0x5382, &(0x7f0000000400)) lremovexattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='trusted.overlay.upper\x00') r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0xa800000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x154, r9, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @rand_addr="f76aeabbaa969f78456ba107240f0272", 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x26}, 0xfffffffffffffff8}}}}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x47}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x1, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r10, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x68, r11, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0x20008080) r12 = syz_open_dev$media(&(0x7f0000000900)='/dev/media#\x00', 0x1f, 0x482400) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000980)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r12, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x24, r13, 0x0, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x100000000}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40044004}, 0x40018) getsockopt$inet_sctp_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f0000000a80), &(0x7f0000000ac0)=0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000b00)=@v2={0x2, @adiantum, 0x0, [], "69d3e9775dab8a48ec13ff1fd859aac2"}) 23:05:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x117000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x82b6, 0x1}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xa628a62e6ff25cda, 0x80) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x78}, &(0x7f0000000180)=0x8) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f00000001c0)=0x63, &(0x7f0000000200)=0x4) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x3e, 0xfffffffffffffc00, @buffer={0x0, 0x8, &(0x7f0000000240)=""/8}, &(0x7f0000000280)="bafad60d1ce7134e959b39eb48ceffb4b7b139ca063eef2c5c8ae78e45f925a3d94be9792762d3dd5eeb0f2173ec3d3d2ea15fc631c66082dcab23a8dd71", &(0x7f00000002c0)=""/165, 0x1f, 0x5, 0x1, &(0x7f0000000380)}) r4 = syz_open_dev$video4linux(&(0x7f0000000440)='/dev/v4l-subdev#\x00', 0x6, 0x800) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000480)) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000004c0)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000680)) r6 = syz_open_dev$cec(&(0x7f00000006c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000700)=0xb079, 0x4) r7 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000740)='/dev/video0\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000780)=0x5) ioctl$VIDIOC_OVERLAY(r6, 0x4004560e, &(0x7f00000007c0)=0x1) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vsock\x00', 0x8000, 0x0) read$char_usb(r8, &(0x7f0000000840)=""/177, 0xb1) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/net/pfkey\x00', 0x809b25940d4b9c12, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r9, 0xc08c5336, &(0x7f0000000940)={0x1, 0x5, 0xffffffffffffeb5e, 'queue0\x00', 0x9}) ioctl$VIDIOC_ENCODER_CMD(r4, 0xc028564d, &(0x7f0000000a00)={0x0, 0x1, [0xfff, 0x2, 0x29, 0x7, 0x6, 0x3, 0x3, 0x4]}) clock_getres(0x0, &(0x7f0000000a40)) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vsock\x00', 0x408100, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r10, 0x84, 0x16, &(0x7f0000000ac0)={0x5, [0x80, 0x8, 0xd5, 0x4906, 0x0]}, &(0x7f0000000b00)=0xe) r11 = syz_open_dev$radio(&(0x7f0000000b40)='/dev/radio#\x00', 0x0, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001e00)={r11, 0x0, 0xdb, 0x1000, &(0x7f0000000b80)="94bdef62c83247a94e54715a6e684b99201530bc23808c6de317f84e0a0624569221c593ab6bf73ecede3f27c33cd6073b3d1ef8e57cdabd9e7c288701f7c8a91aef59a2000d43b7fd43b8538b8962242198323442ae5fe9698b109f5525f32c01fe92c70940a4bc09b3d038efc3981bb1bb273f9e9ea0f4b8d219287b369b628b3fe7f5a152a895b6f0d4ad29ca41a22f122aab6d97abae4972e41459eed31e87885b56c9bf87f376ad9c8399bae04546fb34a41e1944632f27a2255a3f342571c2deae32ca49091a35dd3b1499b638dc7a380ae038b76d71fcd9", &(0x7f0000000c80)=""/4096, 0x3, 0x0, 0x96, 0xac, &(0x7f0000001c80)="f99a47d3e8405d172c47a88b12071d78ea894314c390dd7708281bbe02e6fd992a53a55fb5929ac5a11028a5e657fd10814198d39d3ada79137dc2accf20ff1e3a153dde69519f818500e047bd8f5bfd11c6a2570a729dba07e3a0c7e1020d68c8833058af9f096ca72b13f193d95a5552b0439640f08908a05a8f360db9569481854bba5e82d370fd6ac55487d7d4d293a8dae28026", &(0x7f0000001d40)="5ea1eebb157ff0245519fed15af6e71b2afd87a1da77cbbf7f09e93b02b2158d17dda28d5f478191a6fd5914b81d064f1f271bcbde9a75646e39a20b6eff6a7b9f15fbc573c87738a83f56a56122048813425423d258423d597268d7c2433538ed547498af4ef0614d043d5f07f22f943ec16ec7b9afb59ea003c26e5328a6e0593ef2946ebfb9d32766a77e22f9047f93d7abd799775b5a7689cee318f286f63e9c34533ba92639f917cedc"}, 0x40) syz_open_dev$sg(&(0x7f0000001e40)='/dev/sg#\x00', 0x0, 0x400) syzkaller login: [ 202.459652][ T8853] IPVS: ftp: loaded support on port[0] = 21 [ 202.520585][ T8854] IPVS: ftp: loaded support on port[0] = 21 [ 202.616967][ T8853] chnl_net:caif_netlink_parms(): no params data found [ 202.669192][ T8853] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.677015][ T8853] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.686994][ T8853] device bridge_slave_0 entered promiscuous mode [ 202.698974][ T8853] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.707954][ T8853] bridge0: port 2(bridge_slave_1) entered disabled state 23:05:15 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc8) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40000800) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e23, @local}, 0x20, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)='ifb0\x00', 0x401, 0x0, 0x2}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x3, &(0x7f0000000240)="236fca860d39f3ea77b10b9ac9edad6d1535c5d2dbb62b5b6da21cfb69650149d9a5f413a8c1e88c0e731eb5de5cdd649b49df8a6e3958f1597d088e35fbedf3937262db232677c76857c718dd71bd17372078cdab818d0924aa969249f475653fef794f85b47240337b148be8848c4fd636749f542e486722b6af508d") r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$uinput_user_dev(r3, &(0x7f00000002c0)={'syz1\x00', {0x7fffffff, 0x800, 0x2, 0x10001}, 0x2, [0x1, 0x401, 0x7, 0x1, 0x20, 0x2, 0xffffffffffff8000, 0x46790fe, 0x7ff, 0x8, 0x3, 0x10000, 0xfffffffffffffffd, 0xfff, 0x3, 0x7ff, 0x5, 0x6, 0x63a3c670, 0x7, 0x0, 0x1, 0x8, 0x0, 0x4, 0xba, 0x7, 0x6, 0x6, 0xff, 0x101, 0x200, 0xf2, 0x6b96, 0x634, 0x0, 0x3f, 0x8, 0x7ff, 0x56b9, 0xffffffff, 0x9, 0x74c, 0x9, 0x81, 0x1, 0xff, 0x3, 0xff, 0x43, 0x30, 0xda5c, 0x0, 0x6, 0x7f, 0x80000000, 0x5, 0x1, 0x1, 0xfffffffffffffff7, 0x3, 0x5, 0x7, 0x5], [0x4, 0x2, 0x87c2, 0xd99, 0x3, 0xffffffffffffffe0, 0x20, 0x7, 0x20, 0xc38b, 0x6, 0x5, 0x5, 0x1, 0x0, 0x1, 0x7, 0x7, 0xff, 0x2, 0x80000001, 0xd98, 0x9, 0x3, 0xfe, 0x2, 0x4, 0x9, 0xfffffffffffffa63, 0x3, 0x1ff, 0x58, 0x4, 0x101, 0x0, 0x6, 0xb86, 0x3, 0x80000001, 0x8, 0x81, 0xffff, 0x9, 0x9, 0x0, 0x7, 0x66, 0x7, 0x6, 0x2, 0x0, 0xffffffff80000001, 0x1934, 0x660, 0xd049, 0x7, 0x65, 0x3, 0x1, 0x3ff, 0x10000, 0xffffffffffff79e8, 0x80, 0xb08], [0x6, 0x7, 0x2, 0x80000000, 0x7, 0x2, 0x8, 0x1, 0x4, 0xffffffff, 0x84c2000000000, 0x4, 0x4, 0x3, 0x3, 0x20, 0x1, 0x2, 0x2, 0x3, 0x8, 0x100000000, 0x9, 0x3, 0x8001, 0xc3, 0x7, 0x2, 0x40, 0x20, 0x3, 0x0, 0xae, 0x3, 0x2, 0x8, 0x1, 0x4, 0xffffffffffffffab, 0x6884, 0x4, 0x7d9, 0x3, 0x6, 0x1, 0x1f, 0x7, 0x5, 0x7ff, 0x9, 0x9, 0x2f900000000, 0x5000000000000000, 0x4, 0xab66, 0x6, 0x4052, 0x100000000, 0x80000000, 0x0, 0x1, 0x31, 0x94c, 0x101], [0x200, 0xfff, 0x5f, 0x0, 0x5, 0x4, 0x7, 0x1, 0xcdd5, 0x12c, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0x40, 0x401, 0x1, 0xf66, 0x101, 0x7, 0x2, 0x423d4581, 0x100, 0x7, 0x2, 0xffff, 0x1, 0x76a6, 0x100000001, 0xb18d, 0x8, 0x1, 0xf, 0x1, 0x3, 0x3ff, 0xfffffffffffffffe, 0x1, 0x9, 0x7, 0x7, 0x9, 0x52cb, 0xc000000000, 0x4, 0x0, 0x1, 0x9, 0x1, 0x5b, 0x3, 0x2, 0x90, 0xffffffffffffff12, 0xff, 0x1000, 0x0, 0xff, 0x3, 0x0, 0x6, 0x2, 0x4, 0x4]}, 0x45c) getresgid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)=0x0) r6 = getegid() r7 = getegid() getgroups(0x5, &(0x7f0000000800)=[0xee00, r4, 0xffffffffffffffff, r6, r7]) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000840)={0x3, 0x3, 0x1, 0x80000001, '\x00', 0x4}) r8 = accept(0xffffffffffffffff, &(0x7f0000000880)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000900)=0x80) ioctl(r8, 0x4, &(0x7f0000000940)="d8e8c1e429b4614927c6cc095041c3b769997ed86494c8cea5b48d8d43e8979bc4507e7f950557") r9 = syz_open_dev$midi(&(0x7f0000000980)='/dev/midi#\x00', 0xffffffff, 0x80e80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000b80)={r9, &(0x7f00000009c0)="4f64293d009db88ee395da3c77e0cde2d680cf6009f671120b01442b1aa67813c93be12392579fc194d7ee5ceff05d48a2f2647d50232252e66154b0f08ea58f518a7ddb636e61f3d9f0b571c6644671927810b32149130820c8ed877d4a103a3572459410ace099a3af6ff94a25d3e5d5ded2874b32f9142d9957e56ff2d0f3a57f8a60852a062930b73975f93120055b11d42cab13dd4b6b4debb2e0d1", &(0x7f0000000a80)=""/204, 0x7752f6e9b0baf781}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000bc0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r10, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x608c3ad69affac80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x30, 0x0, 0x20, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x7fffffff, @bearer=@udp='udp:syz0\x00'}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4840) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/hwrng\x00', 0xfb94d8fe7463817c, 0x0) r12 = getuid() getresgid(&(0x7f0000000d40)=0x0, &(0x7f0000000d80), &(0x7f0000000dc0)) r14 = geteuid() getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000e00)={0x0, 0x0, 0x0}, &(0x7f0000000e40)=0xc) write$FUSE_DIRENTPLUS(r11, &(0x7f0000000e80)={0x148, 0x0, 0x8, [{{0x5, 0x2, 0x2, 0x8, 0x1, 0x6, {0x5, 0x2, 0x10001, 0x3fb, 0x0, 0xff, 0x8, 0x1a, 0x10000, 0xfcdb, 0x7f, r12, r13, 0x0, 0x7}}, {0x2, 0x6, 0x0, 0x1}}, {{0x5, 0x1, 0x3, 0x3, 0x3, 0x4, {0x2, 0x6, 0x3, 0x1f, 0xfffffffffffffff8, 0x1000, 0x5, 0x1000, 0x3, 0x1, 0x100000000, r14, r15, 0x1, 0x10000000}}, {0x2, 0x10001, 0x8, 0x3, '+.vmnet0'}}]}, 0x148) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r10, 0x84, 0x15, &(0x7f0000001000)={0x9}, 0x1) getgroups(0x2, &(0x7f0000001040)=[r4, r5]) r16 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r16, 0x400c4301, &(0x7f00000010c0)={0x0, 0x6d, 0x1}) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000001100)) [ 202.716704][ T8853] device bridge_slave_1 entered promiscuous mode [ 202.801789][ T8853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.820176][ T8854] chnl_net:caif_netlink_parms(): no params data found [ 202.833854][ T8853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.902616][ T8853] team0: Port device team_slave_0 added [ 202.911041][ T8854] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.936003][ T8854] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.944135][ T8854] device bridge_slave_0 entered promiscuous mode [ 202.953414][ T8858] IPVS: ftp: loaded support on port[0] = 21 [ 202.966788][ T8853] team0: Port device team_slave_1 added [ 202.987888][ T8854] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.995003][ T8854] bridge0: port 2(bridge_slave_1) entered disabled state 23:05:15 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000100)=0x80000001, 0x4) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x81, 0x12ca, 0x8}, &(0x7f00000001c0)=0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x70, r4, 0x9, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20008000}, 0x2000030) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r5, 0x3c) r6 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x9, 0x2) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x6}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000440)={r7, 0x5, 0x30, 0x9, 0xfffffffffffffc01}, &(0x7f0000000480)=0x18) openat$capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/capi20\x00', 0x20100, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000640)={@can, {&(0x7f0000000500)=""/236, 0xec}, &(0x7f0000000600), 0x22}, 0xa0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/btrfs-control\x00', 0x2a000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) sendmsg$nl_route_sched(r8, &(0x7f0000000980)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x410200}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@deltfilter={0x54, 0x2d, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, r9, {0xb, 0x6}, {0xe63a43f306165b3b, 0x1}, {0x0, 0x7ff1}}, [@TCA_RATE={0x8, 0x5, {0x1, 0x4}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x14, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8, 0x4, 0x1}, @TCA_TCINDEX_MASK={0x8, 0x2, 0x5}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x8008}, 0x8000) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f00000009c0)={0x200, 0x7, 0x9}) r10 = socket$packet(0x11, 0x3, 0x300) fcntl$addseals(r10, 0x409, 0x4) r11 = accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x80) setsockopt$TIPC_GROUP_LEAVE(r11, 0x10f, 0x88) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000ac0)={[0x6000, 0xf000, 0xf000, 0x3000], 0x0, 0x5d, 0x100}) r12 = syz_open_dev$mouse(&(0x7f0000000b40)='/dev/input/mouse#\x00', 0x4, 0x18000) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000b80)={0x0, 0x3}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r12, 0x84, 0x70, &(0x7f0000000c00)={r13, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, [0x8001, 0x3ff, 0x8, 0x20, 0xffffffffffffffff, 0x400, 0x4, 0x7fffffff, 0xfffffffffffffff9, 0x3f, 0x5, 0x6, 0x200, 0x2, 0x150]}, &(0x7f0000000d00)=0x100) r14 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)=0x0) write$P9_RGETLOCK(r14, &(0x7f0000000dc0)={0x31, 0x37, 0x1, {0x1, 0x2, 0x2, r15, 0x13, '/dev/btrfs-control\x00'}}, 0x31) [ 203.007689][ T8854] device bridge_slave_1 entered promiscuous mode [ 203.090825][ T8853] device hsr_slave_0 entered promiscuous mode [ 203.190917][ T8860] IPVS: ftp: loaded support on port[0] = 21 [ 203.218285][ T8853] device hsr_slave_1 entered promiscuous mode [ 203.250265][ T8854] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.262892][ T8854] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:05:15 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10001, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=@deltaction={0x11c, 0x31, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x88, 0x1, [{0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0xfa8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0xa90f4e}}, {0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20}, 0x40000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000280)={0x2, 0x7fff, @name="a33bd52539dd7ea5af47e058a3a7eef50dc4d49616efb3bc2fd95f2ff6f35ea9"}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x4) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000300)) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000380)={r0}) r4 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x2, 0x2) write$FUSE_INIT(r4, &(0x7f0000000400)={0x50, 0xfffffffffffffffe, 0x1, {0x7, 0x1f, 0x5, 0x84000, 0x2, 0x1, 0xffffffffffffffff, 0x637}}, 0x50) r5 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x1, 0x2) bind$vsock_dgram(r5, &(0x7f00000004c0), 0x10) r6 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x2, 0x400) ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f0000000540)=""/4096) r7 = inotify_init() ioctl$INOTIFY_IOC_SETNEXTWD(r7, 0x40044900, 0x2) listxattr(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/219, 0xdb) setxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x1) r8 = openat(r5, &(0x7f0000001740)='./file0\x00', 0x2, 0x1fa) setsockopt$packet_int(r8, 0x107, 0x3, &(0x7f0000001780)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r9 = accept$inet6(r5, &(0x7f0000001800)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000001840)=0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000001880)={0x0, {{0xa, 0x4e22, 0x4, @loopback, 0x7}}}, 0x88) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000001980)={0x0, 0x1, 0x1f, &(0x7f0000001940)=0x800}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000019c0)=[@in={0x2, 0x48, @dev={0xac, 0x14, 0x14, 0x1a}}, @in6={0xa, 0x4e21, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x89}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @broadcast}, 0x9}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xfce, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x81}], 0x74) prctl$PR_MCE_KILL_GET(0x22) pipe2(&(0x7f0000001a40)={0xffffffffffffffff}, 0x800) ioctl$UI_SET_FFBIT(r10, 0x4004556b, 0x54) r11 = syz_open_dev$loop(&(0x7f0000001a80)='/dev/loop#\x00', 0x3, 0x4020) ioctl$BLKFRASET(r11, 0x1264, &(0x7f0000001ac0)=0xf97f) [ 203.290557][ T8854] team0: Port device team_slave_0 added [ 203.311104][ T8854] team0: Port device team_slave_1 added [ 203.374407][ T8853] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.381636][ T8853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.389577][ T8853] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.396708][ T8853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.488581][ T8854] device hsr_slave_0 entered promiscuous mode [ 203.512114][ T8862] IPVS: ftp: loaded support on port[0] = 21 [ 203.525981][ T8854] device hsr_slave_1 entered promiscuous mode 23:05:16 executing program 5: setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000)=0x3, 0x4) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101001, 0x0) tee(r0, r1, 0xfff, 0x2) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x100) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000100)=0x2, 0x4) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x801, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f00000001c0)) r4 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x3, 0x800) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000280)={0x1, 0x1, 0x320, 'queue0\x00', 0x200}) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000340)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000380), 0x4) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x18601, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000440)={r6, 0x80000}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000480)=0x3, 0x4) r7 = open(&(0x7f00000004c0)='./file0\x00', 0x1, 0x8) setsockopt$inet_buf(r7, 0x0, 0x4, &(0x7f0000000500)="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", 0x1000) r8 = syz_open_dev$usbmon(&(0x7f0000001500)='/dev/usbmon#\x00', 0x3, 0x1) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001580)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000001680)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001640)={&(0x7f00000015c0)={0x7c, r9, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff89}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4004080}, 0x48a8) getrandom(&(0x7f00000016c0)=""/187, 0xbb, 0x4) read$alg(r4, &(0x7f0000001780)=""/83, 0x53) ioctl$VIDIOC_REQBUFS(r7, 0xc0145608, &(0x7f0000001800)={0x4, 0x9, 0x1}) r10 = syz_open_dev$midi(&(0x7f0000001840)='/dev/midi#\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000001880)=@assoc_value, &(0x7f00000018c0)=0x8) r11 = syz_open_dev$vcsa(&(0x7f0000001900)='/dev/vcsa#\x00', 0x0, 0xdf347fb1214b0f5f) ioctl$TIOCMSET(r11, 0x5418, &(0x7f0000001940)=0x3) [ 203.595688][ T8854] debugfs: Directory 'hsr0' with parent '/' already present! [ 203.634277][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.653338][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.835002][ T8858] chnl_net:caif_netlink_parms(): no params data found [ 203.848964][ T8869] IPVS: ftp: loaded support on port[0] = 21 [ 203.870677][ T8860] chnl_net:caif_netlink_parms(): no params data found [ 203.977617][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.984848][ T8860] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.993140][ T8860] device bridge_slave_0 entered promiscuous mode [ 204.001220][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.008426][ T8860] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.016571][ T8860] device bridge_slave_1 entered promiscuous mode [ 204.023833][ T8858] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.031123][ T8858] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.041336][ T8858] device bridge_slave_0 entered promiscuous mode [ 204.063361][ T8853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.083755][ T8858] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.091632][ T8858] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.099794][ T8858] device bridge_slave_1 entered promiscuous mode [ 204.123407][ T8858] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.135214][ T8860] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.149245][ T8860] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.166658][ T8858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.210824][ T8854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.225698][ T8860] team0: Port device team_slave_0 added [ 204.258531][ T8860] team0: Port device team_slave_1 added [ 204.265687][ T8858] team0: Port device team_slave_0 added [ 204.300942][ T8858] team0: Port device team_slave_1 added [ 204.311671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.321549][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.331652][ T8853] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.341131][ T8862] chnl_net:caif_netlink_parms(): no params data found [ 204.398950][ T8860] device hsr_slave_0 entered promiscuous mode [ 204.436234][ T8860] device hsr_slave_1 entered promiscuous mode [ 204.495910][ T8860] debugfs: Directory 'hsr0' with parent '/' already present! [ 204.552683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.561756][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.570303][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.577587][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.585233][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.593127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.600911][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.609779][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.618362][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.625423][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.638321][ T8854] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.687724][ T8858] device hsr_slave_0 entered promiscuous mode [ 204.736133][ T8858] device hsr_slave_1 entered promiscuous mode [ 204.775649][ T8858] debugfs: Directory 'hsr0' with parent '/' already present! [ 204.815018][ T8862] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.824409][ T8862] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.832491][ T8862] device bridge_slave_0 entered promiscuous mode [ 204.842602][ T8862] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.850210][ T8862] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.858078][ T8862] device bridge_slave_1 entered promiscuous mode [ 204.875977][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.884625][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.895762][ T2925] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.903021][ T2925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.910852][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.922609][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.939120][ T8862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.952626][ T8869] chnl_net:caif_netlink_parms(): no params data found [ 204.970068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.979907][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.988780][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.995919][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.017486][ T8862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.048987][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.058358][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.068398][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.077794][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.086369][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.095138][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.103850][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.112405][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.120817][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.129299][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.138163][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.147056][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.155963][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.164715][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.173860][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.182433][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.190991][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.199485][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.208637][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.225030][ T8854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.258132][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.272254][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.297465][ T8862] team0: Port device team_slave_0 added [ 205.310681][ T8862] team0: Port device team_slave_1 added [ 205.317873][ T8853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.348983][ T8869] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.356363][ T8869] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.364555][ T8869] device bridge_slave_0 entered promiscuous mode [ 205.373657][ T8869] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.381658][ T8869] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.390060][ T8869] device bridge_slave_1 entered promiscuous mode [ 205.413056][ T8854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.447724][ T8860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.458838][ T8869] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.505665][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.513515][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.524271][ T8869] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.589390][ T8862] device hsr_slave_0 entered promiscuous mode [ 205.636094][ T8862] device hsr_slave_1 entered promiscuous mode [ 205.687071][ T8862] debugfs: Directory 'hsr0' with parent '/' already present! [ 205.697959][ T8860] 8021q: adding VLAN 0 to HW filter on device team0 23:05:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x8008af26, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) [ 205.768404][ T8869] team0: Port device team_slave_0 added [ 205.788629][ T8853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.807239][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.818690][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.827413][ T2925] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.834677][ T2925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.864340][ T8869] team0: Port device team_slave_1 added [ 205.904233][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.914469][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.923829][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.933030][ T8863] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.940666][ T8863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.949770][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 23:05:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x3c0, 0x0) pipe(0x0) pipe(0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r2}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0x9}, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000480)={0x0, @motion_det}) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x4}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x3f2, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0xef15}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') ptrace(0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) accept$alg(r5, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000040)={'nr0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}) preadv(r4, &(0x7f00000017c0), 0x333, 0x0) syz_open_dev$midi(0x0, 0x0, 0x80000) gettid() openat$sequencer(0xffffffffffffff9c, 0x0, 0x18b000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000240)) [ 206.021616][ T8869] device hsr_slave_0 entered promiscuous mode [ 206.056430][ T8869] device hsr_slave_1 entered promiscuous mode [ 206.095738][ T8869] debugfs: Directory 'hsr0' with parent '/' already present! [ 206.116340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.125404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.135019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.143554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.153031][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.162105][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.170576][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.179489][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.188358][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.213834][ T8858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.243478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.283030][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.307008][ T8858] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.323476][ T8862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.348230][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.364152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.386997][ T8862] 8021q: adding VLAN 0 to HW filter on device team0 23:05:18 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) shutdown(r0, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) shutdown(r1, 0x3) [ 206.414709][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.423156][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.432986][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.443891][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.455182][ T8872] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.462480][ T8872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.484088][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.493441][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.503991][ T8872] bridge0: port 2(bridge_slave_1) entered blocking state 23:05:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70040000190001000003000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a007f6087000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080003000a050000080004001a340000b4001100e0000002000000000000000000000000aa61bf30dbeea055ba847911eea7773cff020000000000000a000c00ff020000000000000000000000000001e0000001000000000000000000000000c80400000000000002000a00fe80000000000000000000000000002be0000001000000000000000000000000e4000000013500000a000a00ac1e0001000000000000000000000000ac1414bb0000000000000000000000006c030000000000000a00020008000c0000080000100112006165676973323536000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010060000c000000078db6e2123d1e0a6fedf797ef862d0c75f996abb93215a803f916946403fc7fd116c910e67348638bd0f530bce934489611a0fba4c211c8ceb46db6b8c04fca4171dba37368527d47a89d7ce8c75932af2c85f4b9a50febb20ae77c32b01084eef02e1ae33b06217fca338538414f1342420feefa9e05c27b086e7d1503d1b2678567b7e2c29ee2fa867773a927cbc26a3d2765d8093fe8ee5eb3e567d10a3efec5780f06536154de9c85585bd8e339ba96840f88da209f47e589e3953f30546ad6e0000c4010500fe8000000000000000000000000000bb000004d43200000049ec000000001e6e000000000000000000000000073500000400050005000000ff03000000000000ac1414bb000000000000000000000000000004d63300000002000000ac1414140000000000000000000000000000000000000500090000006e360000ffffff7ffe880000000000000000000000000001000004d46c0000000a0000007f0000010000000000000000000000000235000000010400070000000200000001000000ac1414bb000000000000000000000000000004d5320000000a00000000000000000000000000000000000000073500000200000000800000010000000500000051d8e375ba55d8a64eca0687954db800000004d2330000000a000000000000000000000000000000000000010535000000016f000900000000010000ff01000000000000000000000000ffffffffffff000004d53c00000002000000ac1e00010000000000000000000000000000000003010800090000000700000004000000fe880000000000000000000000000001000004d22b000000000000007f00000100000000000000000000000003350000040209000700000000000000ffff0000080003000a03000010000a0027bd70002abd700056000000"], 0x470}}, 0x0) [ 206.511144][ T8872] bridge0: port 2(bridge_slave_1) entered forwarding state 23:05:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/control\x8e#\x00', 0xe6, 0x29c523) r1 = gettid() tkill(r1, 0x800040000000015) write$FUSE_LK(r0, &(0x7f0000000280)={0x28, 0x0, 0x8, {{0x8000, 0x3, 0x0, r1}}}, 0x28) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x40000006) r2 = syz_open_dev$vbi(0x0, 0x3, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) io_setup(0x9, &(0x7f00000000c0)=0x0) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) io_cancel(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x17, 0x8, r2, &(0x7f0000000100)="d4d596f4ab518d1430290095a141744fb6509ea8eb94228521b36bf65ff2ee1d9b221470c0dd9daaf4e207287712e879c09fe255c0b234277f78a03c7e4cfed87e5b94bba46bfb1591487cd8017d19e8995c8abde43a8bd71e8dd6ec90e4ccec49b308f5ef533a84d5953ca604830739757fa89ca7ba4c10b54711f544a968aa3656c5dddfda787d1ba59b604ffe6289e33320c8e5fa50067769f7e85005bf2d991658027a059c2ee275d3eefc1738ccc1e199f95047fc18a488323222a9ac91d0", 0xc1, 0x7fffffff, 0x0, 0x1, r4}, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4e67, 0x80}, 0x8) read(r0, 0x0, 0xfffffff0) [ 206.579767][ T8860] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.598151][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.614195][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.637030][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.663003][ T2925] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.670192][ T2925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.678582][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.687610][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.696581][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.705562][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.714246][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.723866][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.745030][ T8858] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 206.759625][ T8858] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.775009][ T8869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.798833][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.807334][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.815366][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.828303][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.837335][ T8872] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.844395][ T8872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.852640][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.861733][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.870351][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.879591][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.889278][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.898934][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.907896][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.917761][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.926824][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.935594][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.944324][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.953285][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.962997][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.971465][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.016170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.026598][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.039575][ T8862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:05:19 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100600000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r2, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x28}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20008040) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000300)={0x0, 0x80000000000000, 0x20}) r3 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r3, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xd55) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x0, 0x280, 0x0, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000140), {[{{@arp={@multicast2, @loopback, 0x100000180, 0xff, @mac=@link_local, {[0x0, 0xe9ee0d9c9a7487b7, 0x1fe, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0x7f]}, 0x8, 0x7, 0x101, 0x3, 0x6, 0x10001, 'sit0\x00', 'vlan0\x00', {0xff}, {}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2, 0xf}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0xc}, @multicast1, 0xff, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0x0, 0x0, 0x0, 0xff]}, 0x406, 0x1, 0xfffffffffffffeff, 0x6, 0x9, 0x401, 'ip6gre0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @mac=@remote, @remote, @loopback, 0x4}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @multicast2, @broadcast, 0x8, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0xffffffffffffff82) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)='/', 0x1}, {&(0x7f0000000280)="d1", 0x20000101}], 0x2}], 0x1, 0x0) [ 207.062120][ T8858] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.083097][ T8869] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.137291][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.147327][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.158245][ C0] hrtimer: interrupt took 34192 ns [ 207.187007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.200648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.231057][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.238255][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.271438][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.291596][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 23:05:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x7, 0x2, 0xf000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000020) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xa, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 207.319364][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.342518][ T3011] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.349703][ T3011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.377850][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.398016][ T8862] 8021q: adding VLAN 0 to HW filter on device batadv0 23:05:20 executing program 2: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) [ 207.433895][ T8921] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 207.434445][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:05:20 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100600000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r2, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x28}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20008040) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000300)={0x0, 0x80000000000000, 0x20}) r3 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r3, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xd55) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x0, 0x280, 0x0, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000140), {[{{@arp={@multicast2, @loopback, 0x100000180, 0xff, @mac=@link_local, {[0x0, 0xe9ee0d9c9a7487b7, 0x1fe, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0x7f]}, 0x8, 0x7, 0x101, 0x3, 0x6, 0x10001, 'sit0\x00', 'vlan0\x00', {0xff}, {}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2, 0xf}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0xc}, @multicast1, 0xff, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0x0, 0x0, 0x0, 0xff]}, 0x406, 0x1, 0xfffffffffffffeff, 0x6, 0x9, 0x401, 'ip6gre0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @mac=@remote, @remote, @loopback, 0x4}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @multicast2, @broadcast, 0x8, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0xffffffffffffff82) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)='/', 0x1}, {&(0x7f0000000280)="d1", 0x20000101}], 0x2}], 0x1, 0x0) [ 207.475365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.517186][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.537025][ T8925] misc userio: Invalid payload size [ 207.566903][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.604715][ T8926] mmap: syz-executor.2 (8926) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 207.624026][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.642623][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 23:05:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}, 0x40}, {{0x0, 0x0, &(0x7f0000005300)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000008000)={0x400, 0xc, 0x4, 0x10, {0x0, 0x7530}, {0x1, 0x0, 0x0, 0x0, 0x5, 0x8001, "ac7246e9"}, 0x878, 0x3, @fd, 0x4}) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000000)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x1, 0x0, 0x0, 0x8}, 0x0) select(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x9, 0x7fff, 0x0, 0x0, 0xca2, 0x2}, &(0x7f0000000300)={0x77359400}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000340)={0x9679, 0x846, 0x722d, 0x4}, 0x10) ptrace$peek(0x5, 0x0, 0x0) [ 207.667328][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.681056][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.708957][ T8869] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 207.741881][ T8869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.773919][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.792963][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.893822][ T8869] 8021q: adding VLAN 0 to HW filter on device batadv0 23:05:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x1ff, 0x5, 0x1}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7, 0x1100) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x0, 0x5, 0x1}) [ 208.320490][ T8928] misc userio: Invalid payload size 23:05:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x800) sendfile(r2, r1, 0x0, 0x10) shmctl$SHM_LOCK(0x0, 0xb) 23:05:21 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x402200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7fff, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0285629, &(0x7f00000003c0)={0x40000000003, @win={{0x3}, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0}}) 23:05:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x41c1, 0x81422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x800, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000240)={{0x2d0000000000, 0x800}, {0xffffffffffffff16, 0x20}, 0xd29, 0x2, 0x400}) r5 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x15f, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) sendmsg$alg(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}], 0x30}, 0x0) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r6, 0x0, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f00000000c0)={0x3, 0x1, 0xfffffffffffffffb}) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x7892}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 208.432173][ T8921] syz-executor.3 (8921) used greatest stack depth: 21328 bytes left [ 208.501742][ T8958] misc userio: Invalid payload size [ 208.539825][ T8958] misc userio: Invalid payload size 23:05:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r1, &(0x7f0000000000)="1b0000001e001f0214f9f4ff08000000070043d833920000010000", 0x1b) r2 = memfd_create(&(0x7f0000000100)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) epoll_create1(0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r4 = dup2(r3, r2) write$P9_RLINK(r4, 0x0, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, 0x0) ioctl$TIOCSIG(r5, 0x40045436, 0x30) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x800000000, 0x7, 0xb, 0x0, 0x0, 0x361, 0x3}, 0x0, &(0x7f00000001c0)={0x360, 0x400000000000, 0x400, 0x25, 0x3, 0xffffffffffffffff, 0x4, 0x7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) 23:05:21 executing program 3: socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0xf}}, 0x20) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x0, 0x0, 0x8}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x4ba7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0xfffffffffffffffd, 0x1, 0x54, 0x3, 0x248, 0x4, 0x0, 0x4, 0x2, 0x8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x2604e53d, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x20}, 0x1000, 0x0, 0x0, 0x6, 0x6, 0x8, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sync_file_range(0xffffffffffffffff, 0x4, 0x101, 0x1) 23:05:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}, 0x40}, {{0x0, 0x0, &(0x7f0000005300)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000008000)={0x400, 0xc, 0x4, 0x10, {0x0, 0x7530}, {0x1, 0x0, 0x0, 0x0, 0x5, 0x8001, "ac7246e9"}, 0x878, 0x3, @fd, 0x4}) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000000)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x1, 0x0, 0x0, 0x8}, 0x0) select(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x9, 0x7fff, 0x0, 0x0, 0xca2, 0x2}, &(0x7f0000000300)={0x77359400}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000340)={0x9679, 0x846, 0x722d, 0x4}, 0x10) ptrace$peek(0x5, 0x0, 0x0) 23:05:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00'}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x3, 0x500) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x1a000}, 0x80, &(0x7f0000003b80), 0x26e, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) 23:05:22 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}, 0x40}, {{0x0, 0x0, &(0x7f0000005300)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000008000)={0x400, 0xc, 0x4, 0x10, {0x0, 0x7530}, {0x1, 0x0, 0x0, 0x0, 0x5, 0x8001, "ac7246e9"}, 0x878, 0x3, @fd, 0x4}) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000000)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x1, 0x0, 0x0, 0x8}, 0x0) select(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x9, 0x7fff, 0x0, 0x0, 0xca2, 0x2}, &(0x7f0000000300)={0x77359400}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000340)={0x9679, 0x846, 0x722d, 0x4}, 0x10) ptrace$peek(0x5, 0x0, 0x0) 23:05:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="15dca50d5e0bcfe47bf070") sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0xa) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, 0x0, 0x0) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, 0x0, 0x0) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r6, 0x0, 0x0) r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r7, 0x0, 0x0) r8 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r8, 0x0, 0x0) r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r9, 0x0, 0x0) r10 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r10, 0x0, 0x0) r11 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r11, 0x0, 0x0) r12 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0x7c00, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r12, 0x0, 0x0) r13 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) r14 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r14, 0xc0605345, 0x0) ioctl$TCFLSH(r14, 0x540b, 0x200) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r13, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[], @ANYRESOCT, @ANYRES64, @ANYPTR, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESHEX=r10, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES64=r5, @ANYRES16, @ANYRES32=r11, @ANYPTR], @ANYRESOCT=r12, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRESDEC, @ANYRES64=r0, @ANYRES16=0x0, @ANYPTR64], @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES32=0x0, @ANYRESOCT=r13, @ANYRESDEC, @ANYRES64=r1, @ANYPTR, @ANYPTR]], @ANYRES32=r7, @ANYBLOB="31d02878ed37058553c901bbb50827b4c7096756d7d4fde3f977b0ef3af6a7675e62c0912e100000a49ef59998541e168b2a8731014e87161fe24491c5dd478759ad4de954aa99ea7c82d2ae7158dfb8fbf7eabc7d08345b90b5d54065aa2f36535e39f3eedfa56941c97c55952a88740cf077e432d78752360f9c8b0d75f45e6b4b7fea0a20011a8c2ea68ed4a5c1eb6b22ed54ec32d6f01be1054d805598a5446b889688da0ab5dc8b05d45e224b668e6a00000000000000", @ANYBLOB="07a97fa7dfaa7b4909ff32edc1e3868041509573013ab1fd1f295d5ad1a21a2bd80f421241eb4335a54f546a86cf3af10416f5d5428178c84b38b10c7e991ae1bfe14588485f6e1da15931d92f241396804252f751aafc1690ff414fda515cf6094af81a3074088637c4e0f9daf632bb", @ANYRESHEX=r6], 0x9}, 0x1, 0x0, 0x0, 0xc0800}, 0x20c4) 23:05:22 executing program 3: socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0xf}}, 0x20) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x0, 0x0, 0x8}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x4ba7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0xfffffffffffffffd, 0x1, 0x54, 0x3, 0x248, 0x4, 0x0, 0x4, 0x2, 0x8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x2604e53d, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x20}, 0x1000, 0x0, 0x0, 0x6, 0x6, 0x8, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sync_file_range(0xffffffffffffffff, 0x4, 0x101, 0x1) 23:05:22 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x48) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)={0x1, 0x0, {0x21, 0x22, 0x13, 0x1d, 0x1, 0x8000, 0x4, 0x11d, 0xffffffffffffffff}}) sysfs$2(0x2, 0x6ba3, &(0x7f0000000040)=""/12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x248880) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000200)={0xfc147812c6696269}) r6 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000140)={0x1}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f0000000000)={0x83c, 0x4, 0x22, 0x732b7e394c057fba, 0x1, 0x1, 0xc}) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = gettid() tkill(r9, 0x800040000000015) r10 = getpid() r11 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x101000, 0x0) r12 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r12, 0xc0605345, 0x0) kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r11, &(0x7f0000000300)={r12, r1, 0xf8a4000000000000}) vmsplice(r8, &(0x7f0000000a00)=[{&(0x7f0000000c00)="cef447c3105e89656b1ac2bb20218506b0cfdb57c7ff4f46302fe2983ec8916236bbd3e47327a94621c9beb39d8d88b4222d618e279ceaf424cbafcfbaa83245dc94334f8ebedac42d80ef9a4901d99e890f22ed4d7393996e0fe4f1d2764f07d08f48cb564efa9c54b18385add667633180e7af87ae8dca3d1d4121a53e372426fcb88ae99c1de5ca2ab2840f0d83fcf55af2e0da", 0xd6}, {&(0x7f0000000340)="97cb405b13aee053da452317acbc594447d4bf0aaeae6c1850c9c91d481d94b692e77fe3d750507bbc47dc0e2f6639aaf3e0a5", 0x33}, {&(0x7f0000000540)="e5", 0x1}], 0x3, 0x12) ioctl$ION_IOC_HEAP_QUERY(r8, 0xc0184908, &(0x7f00000002c0)={0x34, 0x0, &(0x7f0000000280)}) [ 209.737834][ T8991] misc userio: Invalid payload size [ 209.805374][ T8991] misc userio: Invalid payload size [ 209.823356][ T8991] misc userio: Invalid payload size [ 209.889932][ T8991] misc userio: Invalid payload size 23:05:22 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000040)=0xfdfdffffffffffff) [ 209.956230][ T8991] misc userio: Invalid payload size [ 209.995434][ T8991] misc userio: Invalid payload size [ 210.010015][ T8991] misc userio: Invalid payload size [ 210.066504][ T9004] misc userio: Invalid payload size [ 210.138708][ T8991] misc userio: Invalid payload size [ 210.175263][ T8991] misc userio: Invalid payload size [ 210.202058][ T8991] misc userio: Invalid payload size 23:05:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x22a281, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x201, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000002c0)={0x1d0003, 0x0, [0x0, 0x0, 0xc0]}) r5 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r5, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r5, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r6 = openat(r5, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x24) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x38, "80215aa89f73818280067b4d42545402c6b2aa47d4f62a640dca4c4a058f5601734f035df3e6ed0bf26b00287e6c37b1ed98ae2afa1d0792"}, &(0x7f0000000140)=0x40) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000180)={r7}, &(0x7f00000001c0)=0x8) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x8090ae81, &(0x7f0000000200)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}) [ 210.222822][ T9014] misc userio: Invalid payload size [ 210.236532][ T9014] misc userio: Invalid payload size [ 210.243835][ T9004] misc userio: Invalid payload size [ 210.250288][ T9004] misc userio: Invalid payload size [ 210.257432][ T9004] misc userio: Invalid payload size [ 210.268442][ T9004] misc userio: Invalid payload size [ 210.279507][ T9004] misc userio: Invalid payload size [ 210.295022][ T8991] misc userio: Invalid payload size [ 210.311845][ T9016] misc userio: Invalid payload size [ 210.364571][ T9018] debugfs: Directory 'vcpu0' with parent '9018-8' already present! 23:05:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x109801, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'sit0\x00'}}, 0x1e) dup2(r2, r1) io_setup(0x7, &(0x7f00000000c0)=0x0) r4 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r4, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) r5 = msgget$private(0x0, 0x0) r6 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r6, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r6, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) getsockopt$IPT_SO_GET_ENTRIES(r6, 0x0, 0x41, &(0x7f00000002c0)={'nat\x00', 0x92, "1c77b516f36f4057ee3c66800455919f0e988116da5cbdc203c8e5a00b51a18234842aa6fb703943d1908902719806044ca813ccc18bb481c1c298f5dd91068e08e3fadb6df81744d5798fdf2d606587aedd70a7511f6c70c677de9d2f0c0e152bf51df65a9f6811be69dc0fd92890406d2894d8f29f6877beb3fec3539570940eb10064a1f52c507c346183d8a1eca43ab5"}, &(0x7f0000000180)=0xb6) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="2848d9a7039667"], 0x1, 0x0) msgrcv(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="4cdfd2bf9029485443287e7723b36dd1ed8abafcadee0c6751235d84c3d07727e7cc5ece66cfe2e46ae067bcbad02cfc9ddccdc0d05a66ac18be20847c5b804f453c7a14b19c9b0af83e4d3aedc7c4fffa1546481cc83205257004773e87724ade8437517bc18cc2e0acdbe7444dc443bb222bb0f8e255bae080d228db24cc1cdc165ce86e127b58b4afbb4ea8125b6ded01937ce9cb4c73dca6279a5b0f79486b194f"], 0x1, 0x0, 0x0) msgctl$MSG_STAT(r5, 0xb, &(0x7f0000000600)=""/245) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000000680)=""/4096) sendto(r4, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r7 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r7, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r7, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000080)={0x2, r7}) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000005, 0x0, r0, 0x0}]) r8 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r8, 0xc0605345, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r9, 0x7}}, 0x10) 23:05:23 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(0xffffffffffffffff) getuid() lstat(&(0x7f0000000040)='./file0\x00', 0x0) getgid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getuid() madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 23:05:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010500"/20, @ANYRESHEX=r0, @ANYBLOB="000000000000000020e84a0240f2580bf7cde29c6df81c0500000c00010062726964676500000c0002000800160040000000"], 0x3}, 0x1, 0x0, 0x0, 0x50}, 0x0) prctl$PR_GET_SECUREBITS(0x1b) 23:05:23 executing program 4: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r0, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000000)=""/153) r1 = socket$inet(0x2, 0x80003, 0x2) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e0000001ac1414aa16966ee0b4c3000000000200000031a82b9b0055961b47ec8adb4d44ee3291913feca24f57499b48fa3fc1f96b16bc167f54457ca8835d519e4195831371ed1f006a8b587faa0c3703ebcf7a991216aefc60d929ab07d731f078d7b5cb17c6de25ab45d8c98473b1a1ed6a7fe266acbd4dc86e52c4c1aea194e157179f197c7c14b41ab089dfb46b9ccee4"], 0x10) 23:05:23 executing program 2: sysfs$2(0x2, 0x6ba3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)={0xfc147812c6696269}) r3 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)={0x1}) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = socket$netlink(0x10, 0x3, 0x28) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r7, 0x0, 0x70bd29, 0x0, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4008004) r8 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r8, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r8, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r9 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r9, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r9, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1a00}, 0xc, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r7, @ANYBLOB="200425bd7000fbdbdf250100000008000100000000000c00060002000000000000000c000800fcffffffffffffff0c00080040000000000000000c00020004000000000000000c00050028000000000000000c00060001000000000000000c00060002000000000000000c00020007000000000000002400070008000100", @ANYRES32, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9], 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000090) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)=0xfb84) fsetxattr(r4, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000240)='\'.\x00', 0x3, 0x0) 23:05:23 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000380)={0x2, 0x7}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x42040, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000300)='/\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r3 = socket(0x1, 0x80000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="240000000000000029000000ff000000ff02000000ff00000000000000000001", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x28}}], 0x2, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x400, 0x0) io_pgetevents(r5, 0x5, 0x5, &(0x7f0000000240)=[{}, {}, {}, {}, {}], &(0x7f00000000c0), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 23:05:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580400000000ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="72d08acc715ed0776428e1f6a6f6749001c4f218bfd442ea99d3aab8c8408f8ddc4a365da9da97515b16289c128a46128778ffcbc8c38da6f42e082dd58b1211c7d4dc5a24b54c4e69dbfaeedb9411b9a60fdab8add4d2137c56b408c2e13a7a37863c170cd2488d05dd6b6e7e31895d04c80e9702a14e1035cb54a4bcf2adeff82d14160a"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xe4ed061c49b7e1c3) r3 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r3, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x9f, "113f3335248a252b4bc66a3a6f23942b0ec7a940602fd6988194817eb0d534801f1a7150c02936a06266102482d0d1386cafd7f18322c42455ecc22ee82aaa42dfe41649fa2ab52e93723087395189f5bd5c6b366870d23c06f228c8c9fb476b32563b58d9b980adba295a2f580c1f2175af27894fbcd4b93df4ec47ea92623ebedf70436881e1839a03992d3f640ae2e6fa6e1416289a872069624c28897c"}, &(0x7f0000000040)=0xa7) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r4, @in6={{0xa, 0x8004e22, 0x87, @rand_addr="c4cae181068aa74560ed269bd611b64f", 0xd7}}, 0x6, 0x1, 0xfff, 0xff, 0xb6}, &(0x7f0000000080)=0x98) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 23:05:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000100)={{0x8, 0x4, 0x910f, 0x1ff}, 0x0, [0x5, 0x5, 0x100, 0x8001, 0x5, 0xfffffffffffff801, 0xdfb, 0xa0, 0x7, 0x80000001, 0x0, 0xca0, 0x6, 0xc00, 0x7, 0x6, 0xeef4, 0x7, 0x8, 0x5, 0x2, 0x9, 0x9, 0x7, 0x1, 0xf4f, 0xd50, 0x6a18a0d5, 0x20, 0x7e, 0xfffffffffffff932, 0xba, 0x1, 0x200, 0x1, 0x80000000, 0x8, 0x5, 0x80, 0x6, 0x3, 0x0, 0x0, 0xfffffffffffffffe, 0x100, 0x81, 0x5, 0x1000000000000000, 0x5f7, 0x6, 0x3, 0x2, 0xfffffffffffff80c, 0x9, 0x6e, 0x0, 0x81, 0x80, 0xffffffff, 0x6e40, 0x20, 0x0, 0x0, 0x9, 0x0, 0x4, 0x6, 0x2, 0x9, 0x5, 0xfffffffffffffff7, 0x1, 0x9, 0x9, 0x4, 0x0, 0x20, 0x8, 0x477, 0x8, 0x5, 0x1, 0xfffffffffffffffe, 0x43d7, 0x8, 0xb8b, 0x82, 0x0, 0x6, 0x3, 0x1f, 0x80000001, 0x80000000000, 0xdf2, 0x7, 0xfffffffffffff114, 0x21b, 0x9, 0x80000000, 0x841, 0x4, 0x1, 0x1, 0x6a, 0xee, 0x6, 0x1f, 0xab, 0x2, 0xc44, 0x401, 0x8bf, 0x536b, 0x6, 0x7, 0x4, 0x7, 0x6, 0x5, 0x8, 0xfffffffffffff982, 0x7, 0x6, 0xb6, 0x6, 0x80000000, 0x10000, 0x7], {r1, r2+10000000}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000010330d1901000000000000000002006ef65df36074fb73561c3dc49000000000"], 0x20}}, 0x0) [ 210.875086][ T9043] misc userio: Invalid payload size [ 210.909598][ T9040] debugfs: File '9037' in directory 'proc' already present! [ 210.921798][ T9047] misc userio: The device must be registered before sending interrupts [ 210.957351][ T9040] debugfs: File '9037' in directory 'proc' already present! 23:05:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580400000000ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="72d08acc715ed0776428e1f6a6f6749001c4f218bfd442ea99d3aab8c8408f8ddc4a365da9da97515b16289c128a46128778ffcbc8c38da6f42e082dd58b1211c7d4dc5a24b54c4e69dbfaeedb9411b9a60fdab8add4d2137c56b408c2e13a7a37863c170cd2488d05dd6b6e7e31895d04c80e9702a14e1035cb54a4bcf2adeff82d14160a"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xe4ed061c49b7e1c3) r3 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r3, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x9f, "113f3335248a252b4bc66a3a6f23942b0ec7a940602fd6988194817eb0d534801f1a7150c02936a06266102482d0d1386cafd7f18322c42455ecc22ee82aaa42dfe41649fa2ab52e93723087395189f5bd5c6b366870d23c06f228c8c9fb476b32563b58d9b980adba295a2f580c1f2175af27894fbcd4b93df4ec47ea92623ebedf70436881e1839a03992d3f640ae2e6fa6e1416289a872069624c28897c"}, &(0x7f0000000040)=0xa7) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r4, @in6={{0xa, 0x8004e22, 0x87, @rand_addr="c4cae181068aa74560ed269bd611b64f", 0xd7}}, 0x6, 0x1, 0xfff, 0xff, 0xb6}, &(0x7f0000000080)=0x98) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 211.055290][ T9047] misc userio: The device must be registered before sending interrupts 23:05:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000140)=0x1000, 0x4) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0xf, 0xd98, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0xfffffffffffffffe, 0x2000000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2076, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) write$P9_RSYMLINK(r1, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x18, 0x4, 0x1}}, 0x14) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000080)={0x0, "23ba38ed985f7a3e24dc5bc898783eaca1bd0ef2e2fc0e560df793666414dcf0", 0x0, 0x2}) r3 = gettid() tkill(r3, 0x800040000000015) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0xffa9, &(0x7f0000000180)={0x0}}, 0x4040005) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b01398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d794080000000000003296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b71e5bd6b453cd2c3d606524edae43846dd4f70148779a55ac6483236"], 0x48}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r8, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="580000002500070574e800100000773f50754d74", @ANYRES32=r8, @ANYBLOB="00000000f1ffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@gettclass={0x24, 0x2a, 0x200, 0x70bd2d, 0x25dfdbfd, {0x0, r8, {0x2, 0xc}, {0xb, 0x1}, {0xffe0, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40) ptrace$peek(0x2, r3, &(0x7f0000000180)) 23:05:25 executing program 2: sysfs$2(0x2, 0x6ba3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)={0xfc147812c6696269}) r3 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)={0x1}) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = socket$netlink(0x10, 0x3, 0x28) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r7, 0x0, 0x70bd29, 0x0, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4008004) r8 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r8, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r8, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r9 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r9, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r9, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1a00}, 0xc, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r7, @ANYBLOB="200425bd7000fbdbdf250100000008000100000000000c00060002000000000000000c000800fcffffffffffffff0c00080040000000000000000c00020004000000000000000c00050028000000000000000c00060001000000000000000c00060002000000000000000c00020007000000000000002400070008000100", @ANYRES32, @ANYBLOB="08000900c80b847f5c8880d7ce7780258c1801ceda15e9c670d0877ba37a22d087ad76e1f4efbcb93adfe23651d2e721e3a3d0136bda625d6d1b99eadea375acb4f97bdd9340fccf7932ae2cbca02af755e2d3210ef0f9df34ef71ff02c833c631ba1b4329c2cbf1eafcfef6ea5f8684ed83c662b67b0a59a3b2644ce97ac201884447c75149e1d076c7ac367413921dd4015ad5e0ef29d139c6594c3ef392cab9374116dbc9517bb37613e5b2374a190c0508086a968700000a125597270fba0ba8868c33da991ae2009b2d386c9c9bf451f6ac54930180cddb800ae496ba6e80332bcbcbcf5e247fa2f3d95cd036e9630ed2cf55216d5d5a0000000000000000000000769511698af81b8a6f7e0bd5aa0c0f22c5e38148b30084106fc6946a025882817bbc1b4d8eee29458e61ab824ff7517215489ac12c088f826cfcff69942a63e7daf0ceba2f280c09ed7fa9ca2b88243fd973d63263404e06922d2d5381ccdbd6425dab10647a2a87c87906ccaa1d3f3e98b0d099", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9], 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000090) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)=0xfb84) fsetxattr(r4, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000240)='\'.\x00', 0x3, 0x0) 23:05:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) syncfs(r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0xbc, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @rand_addr=0x3}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e22, 0x6, @rand_addr="6dc40db61c9f35bc1dce95fc54ba1415", 0x46}, @in6={0xa, 0x4e20, 0xa, @mcast2, 0x6}, @in6={0xa, 0x4e22, 0xffffffffffff27de, @mcast1, 0x5}, @in6={0xa, 0x4e22, 0x7ff, @mcast1, 0x1ff}, @in6={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}]}, &(0x7f0000000200)=0x10) ioctl$KVM_HYPERV_EVENTFD(r3, 0xc018aec0, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x1}) 23:05:25 executing program 4: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, {}, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, "c77c4635"}, 0x0, 0x0, @userptr, 0x4}) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000000)={0x0, @bt={0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000200)={0x400}) r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x100, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000180)={0x18, 0x0, 0x3, {0x8001}}, 0x18) 23:05:25 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000480)={r1, 0xb8, "b8b4a8ef7a13f114b641046ca55bd908e6870549c323bef9658b5d57928b9780b2bf0062fd60cabcfb197e2156326a5c7fbc0f9a57d47e63710dc12dc093536b2a3ed0e6f9c7401f1fa71f57b4a44a31dbde94f010adac8a71fa7f54bcef34131059a7da7d74fe6f47f0cb86ece450d287f9b671a01940d2d6d9d81f77c1340e20eaea22f87046087846b88a0491023d8fe876c81ef573dc0c239d30591db2966ddcd92c646d7ca38f49eb9bfe828b6d503f9705852af78f"}, &(0x7f00000001c0)=0xc0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}}, 0x1f}, &(0x7f0000000440)=0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) set_tid_address(&(0x7f0000000200)) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 23:05:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0xffffffffffffff17}, 0xc) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0xc7, 0x9, 0x9, 0x9, 0x10001, 0x1, 0x7f, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x2f4c, @empty, 0x5}}, [0x10000, 0x8, 0x3, 0x5, 0x1f, 0x100000000, 0x6, 0x0, 0x7, 0x1, 0x5, 0x4, 0x0, 0x0, 0x5]}, &(0x7f0000000300)=0x100) r4 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x5b0, 0x2ac3) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000000)={0x4, &(0x7f0000000080)=""/171}) [ 212.994299][ T9076] misc userio: Invalid payload size 23:05:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1) [ 213.162389][ T9076] misc userio: Invalid payload size 23:05:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) sysfs$1(0x1, &(0x7f0000000040)='/dev/userio\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000180)=""/238) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 23:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x1}) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r2, r1, r2}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00\n\x00'}}) r3 = gettid() r4 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x341002) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000200)=0x7, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_procfs(r3, &(0x7f0000000100)='loginuid\x00') [ 213.432009][ T9097] misc userio: Invalid payload size 23:05:26 executing program 2: sysfs$2(0x2, 0x6ba3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)={0xfc147812c6696269}) r3 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)={0x1}) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = socket$netlink(0x10, 0x3, 0x28) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r7, 0x0, 0x70bd29, 0x0, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4008004) r8 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r8, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r8, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r9 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r9, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r9, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1a00}, 0xc, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r7, @ANYBLOB="200425bd7000fbdbdf250100000008000100000000000c00060002000000000000000c000800fcffffffffffffff0c00080040000000000000000c00020004000000000000000c00050028000000000000000c00060001000000000000000c00060002000000000000000c00020007000000000000002400070008000100", @ANYRES32, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9], 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000090) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)=0xfb84) fsetxattr(r4, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000240)='\'.\x00', 0x3, 0x0) [ 213.776873][ T9101] misc userio: Invalid payload size [ 213.866711][ T9105] debugfs: File '9104' in directory 'proc' already present! 23:05:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x377f, 0x20}, &(0x7f0000000340)=0xc) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x23) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)='}', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x802, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000003c0)="128984c1370a70fe950b8df0db18e336", 0x10) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000900)=ANY=[@ANYRES16], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x618) close(r1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d04000000288a", 0xffffff04) r4 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$alg(r4, &(0x7f00000014c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="ecf9286fc0ddfc55a270ce1469cbaf6e", 0x10}], 0x1, &(0x7f0000000240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x1a000, 0x0) 23:05:26 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000480)={r1, 0xb8, "b8b4a8ef7a13f114b641046ca55bd908e6870549c323bef9658b5d57928b9780b2bf0062fd60cabcfb197e2156326a5c7fbc0f9a57d47e63710dc12dc093536b2a3ed0e6f9c7401f1fa71f57b4a44a31dbde94f010adac8a71fa7f54bcef34131059a7da7d74fe6f47f0cb86ece450d287f9b671a01940d2d6d9d81f77c1340e20eaea22f87046087846b88a0491023d8fe876c81ef573dc0c239d30591db2966ddcd92c646d7ca38f49eb9bfe828b6d503f9705852af78f"}, &(0x7f00000001c0)=0xc0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}}, 0x1f}, &(0x7f0000000440)=0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) set_tid_address(&(0x7f0000000200)) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 213.909561][ T9105] debugfs: File '9104' in directory 'proc' already present! 23:05:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200)=0x0) setfsgid(r1) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="65786563203a3a0a46716d6df3f84dc5d3625c0fdadc9518d0ab2f3aa18b61fef079075cfce135db35051147fe40dce8c1988d98e27b853ac9a7307af5c61019029476fbfa5e5589dea05be06142869e594c25deb62b01e00ed81efe5d14629dd7dd46faf775af67c19b8cb8d0288538d66a6a52961643fec58facfa514d5c1660af6d56a61f3d34a1e9caac729d9effa658bf0c14114f51b75e3def3b92ea651b7261a0757800af05a2906a1fc35141fd8aedc68c0b3d50394ce9c68c6711b873c52e3c6eef83e2a63e032d98172ad229f91e"], 0xd3) 23:05:28 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff9}], 0x1, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0xfffffffffffefffc}], 0x6b) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f0000001200)=""/4096) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0xac00, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000180)=r2) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) r3 = semget$private(0x0, 0x7, 0x0) semctl$SETALL(r3, 0x0, 0x10, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4080000000000016, &(0x7f00000004c0)={0x0, 0x8000}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x3c) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x200, @mcast2, 0x5}, {0xa, 0x4e23, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x401, 0x1, 0x2, 0x5, 0x400, 0x2, 0x1, 0x10000]}, 0x5c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000003c0)=0xc) ptrace(0xe38261d27b6fdb07, r6) r7 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r7, &(0x7f0000ffa000/0x2000)=nil, 0x5000) semget$private(0x0, 0x3, 0x10) shmctl$SHM_LOCK(r7, 0xb) ptrace$getsig(0x4202, r4, 0x3, &(0x7f0000000280)) socket$inet6(0xa, 0xe, 0x2) rt_tgsigqueueinfo(r4, r4, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) semget$private(0x0, 0x7, 0x0) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x800, 0x0) read$char_usb(r8, &(0x7f0000000380)=""/27, 0x1b) 23:05:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}, 0x40}, {{0x0, 0x0, &(0x7f0000005300)=[{0x0}], 0x1}}], 0x2, 0x20, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000008000)={0x400, 0xc, 0x4, 0x10, {0x0, 0x7530}, {0x1, 0x0, 0x0, 0x3f, 0x5, 0x8001, "ac7246e9"}, 0x878, 0x3, @fd, 0x4}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x4000) r5 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xefcf, 0x8200) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) ioctl$KVM_SMI(r4, 0xaeb7) 23:05:28 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086201, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r1, 0x40086201, &(0x7f0000000140)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x9fb31adaf846dd3d) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x15f, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f000000a3c0)=[{{&(0x7f0000002680)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002700)=""/143, 0x8f}, {&(0x7f00000027c0)=""/139, 0x8b}, {&(0x7f0000002880)=""/228, 0xe4}, {&(0x7f0000002980)=""/182, 0xb6}, {&(0x7f0000002a40)=""/78, 0x4e}, {&(0x7f0000002ac0)=""/165, 0xa5}], 0x6, &(0x7f0000002c00)=""/107, 0x6b}, 0x7}, {{&(0x7f0000002c80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000002d00)}, {&(0x7f0000002d40)=""/143, 0x8f}, {&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/68, 0x44}, {&(0x7f0000002ec0)=""/53, 0x35}, {&(0x7f0000002f00)=""/124, 0x7c}, {&(0x7f0000002f80)=""/28, 0x1c}, {&(0x7f0000002fc0)=""/92, 0x5c}, {&(0x7f0000003040)=""/86, 0x56}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0xa, &(0x7f0000004180)=""/250, 0xfa}, 0x400}, {{&(0x7f0000004280)=@caif=@util, 0x80, &(0x7f0000004500)=[{&(0x7f0000004300)=""/115, 0x73}, {&(0x7f0000004380)=""/184, 0xb8}, {&(0x7f0000004440)=""/185, 0xb9}], 0x3, &(0x7f0000004540)=""/73, 0x49}, 0x4}, {{&(0x7f00000045c0), 0x80, &(0x7f0000005c40)=[{&(0x7f0000004640)=""/153, 0x99}, {&(0x7f0000004700)=""/219, 0xdb}, {&(0x7f0000004800)=""/188, 0xbc}, {&(0x7f00000048c0)=""/227, 0xe3}, {&(0x7f00000049c0)=""/245, 0xf5}, {&(0x7f0000004ac0)=""/72, 0x48}, {&(0x7f0000004b40)=""/85, 0x55}, {&(0x7f0000004bc0)}, {&(0x7f0000004c00)=""/4096, 0x1000}, {&(0x7f0000005c00)=""/61, 0x3d}], 0xa, &(0x7f0000005d00)=""/80, 0x50}, 0xc484}, {{&(0x7f0000005d80)=@tipc, 0x80, &(0x7f0000006400)=[{&(0x7f0000005e00)=""/201, 0xc9}, {&(0x7f0000005f00)=""/161, 0xa1}, {&(0x7f0000005fc0)=""/208, 0xd0}, {&(0x7f00000060c0)=""/45, 0x2d}, {&(0x7f0000006100)=""/179, 0xb3}, {&(0x7f00000061c0)=""/16, 0x10}, {&(0x7f0000006200)=""/45, 0x2d}, {&(0x7f0000006240)=""/192, 0xc0}, {&(0x7f0000006300)=""/23, 0x17}, {&(0x7f0000006340)=""/146, 0x92}], 0xa, &(0x7f00000064c0)=""/30, 0x1e}, 0x9}, {{&(0x7f0000006500)=@can, 0x80, &(0x7f0000006840)=[{&(0x7f0000006580)=""/62, 0x3e}, {&(0x7f00000065c0)=""/145, 0x91}, {&(0x7f0000006680)=""/107, 0x6b}, {&(0x7f0000006700)=""/160, 0xa0}, {&(0x7f00000067c0)=""/112, 0x70}], 0x5, &(0x7f00000068c0)=""/194, 0xc2}, 0x3}, {{&(0x7f00000069c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007c80)=[{&(0x7f0000006a40)=""/239, 0xef}, {&(0x7f0000006b40)=""/86, 0x56}, {&(0x7f0000006bc0)=""/31, 0x1f}, {&(0x7f0000006c00)=""/4096, 0x1000}, {&(0x7f0000007c00)=""/104, 0x68}], 0x5}, 0xff}, {{&(0x7f0000007d00)=@nfc_llcp, 0x80, &(0x7f0000009f00)=[{&(0x7f0000007d80)=""/4096, 0x1000}, {&(0x7f0000008d80)=""/170, 0xaa}, {&(0x7f0000008e40)=""/18, 0x12}, {&(0x7f0000008e80)=""/118, 0x76}, {&(0x7f0000008f00)=""/4096, 0x1000}], 0x5}, 0x8}, {{&(0x7f0000009f80)=@nl=@unspec, 0x80, &(0x7f000000a0c0)=[{&(0x7f000000a000)=""/167, 0xa7}], 0x1, &(0x7f000000a100)=""/119, 0x77}, 0x6}, {{&(0x7f000000a180)=@ipx, 0x80, &(0x7f000000a300)=[{&(0x7f000000a200)=""/52, 0x34}, {&(0x7f000000a240)=""/163, 0xa3}], 0x2, &(0x7f000000a340)=""/65, 0x41}, 0x1f}], 0xa, 0x125, &(0x7f000000a640)={0x0, 0x989680}) sendmsg$can_raw(r2, &(0x7f000000a780)={&(0x7f000000a680)={0x1d, r5}, 0x10, &(0x7f000000a740)={&(0x7f000000a6c0)=@canfd={{0x2, 0x1, 0x437, 0x9}, 0x38, 0x1, 0x0, 0x0, "d01ae8f6c686e2cb68992dadce913e9e11718715d74e00795897d4c13b8c6c51fa3abf71a7f5cf72d74629083a3c33396f35b1ae9d38693be9340da7a736d617"}, 0x48}, 0x1, 0x0, 0x0, 0x4004}, 0x1) 23:05:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r1, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000000)=0x1) r2 = dup(r0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc01a00, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) [ 216.097091][ T26] kauditd_printk_skb: 3 callbacks suppressed 23:05:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800100, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x6d, "51f2a2da8e8f7470530e917fe45991e7ebf81305e2e43c024f6f169943633c4b08e5373312f55424ec85d8c609589c88f44970395e1c8996e986552a9a8946e8bbc2c8fffdcc2f28139180300c350fa75b927bc0e9d3de4e72435710f038e761699441099b3ef08e8535b85064"}, &(0x7f0000000080)=0x91) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)={0x2, 0x7}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0), 0x10, 0x0) setresuid(r2, 0x0, r2) 23:05:28 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) userfaultfd(0xc0000) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) mq_open(&(0x7f0000000040)='$\x00', 0x40, 0xe, &(0x7f0000000080)={0x7ff, 0x5, 0x8, 0x5, 0x85, 0x0, 0x7, 0x4}) r2 = fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000000)={0x7ff}, 0x10) write(r5, &(0x7f0000000200)="200000001a00010000000066835f7f081c140000000000000000000004001e00", 0x20) [ 216.097112][ T26] audit: type=1400 audit(1569193528.640:31): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A46716D6DF3F84DC5D3625C0FDADC9518D0AB2F3AA18B61FEF079075CFCE135DB35051147FE40DCE8C1988D98E27B853AC9A7307AF5C61019029476FBFA5E5589DEA05BE06142869E594C25DEB62B01E00ED81EFE5D14629DD7DD46FAF775AF67C19B8CB8D0288538D66A6A52961643FEC58FACFA514D5C1660AF6D56A61F3D34A1E9CAAC729D9EFFA658BF0C14114F51B75E3DEF3B92EA651B7261A07578 pid=9142 comm="syz-executor.1" 23:05:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000000180)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000000c0)={0x4a, 'syz0\x00'}) [ 216.255007][ T9150] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) [ 216.331025][ T9154] misc userio: Invalid payload size [ 216.376084][ T9154] misc userio: Invalid payload size 23:05:29 executing program 4: unshare(0x10000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x54) lseek(r1, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 23:05:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) ptrace$peek(0x1, r2, &(0x7f0000000080)) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000c86000), &(0x7f0000000000)) 23:05:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}, 0x40}, {{0x0, 0x0, &(0x7f0000005300)=[{0x0}], 0x1}}], 0x2, 0x20, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000008000)={0x400, 0xc, 0x4, 0x10, {0x0, 0x7530}, {0x1, 0x0, 0x0, 0x3f, 0x5, 0x8001, "ac7246e9"}, 0x878, 0x3, @fd, 0x4}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x4000) r5 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xefcf, 0x8200) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) ioctl$KVM_SMI(r4, 0xaeb7) [ 216.465959][ T9154] misc userio: Invalid payload size 23:05:29 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) fstat(r1, &(0x7f0000000040)) getdents(r0, &(0x7f0000000100)=""/148, 0x313) getdents(r0, 0x0, 0x0) 23:05:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r0, &(0x7f00000000c0)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677386598c484805c58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65eb690044217338efe400fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae54ca01062841cc0b6ab67c0ffaa15adb5c771f66a64d2f55abdc8d90f7aeb97f88c4af7db3e9c1a3dfdee7eb94cab2daa0f33a0c3ba66071d2b2d6de32e958b063a5a348a4620297169e3dd0bd75c7986c8af1437899d7abfcec6f7a0eff3bc82f7513b97ccda2c1dd3bb8f859e9056e0edd15728ea8b28dd6bbb0000", 0x14e, 0x33fe4158477042b5, &(0x7f0000000240)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0xfff}, 0x80) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4376fea3e446f4e1, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x80000006}]}, 0x10) [ 216.753718][ T9179] misc userio: Invalid payload size 23:05:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dinp\xff\xff\xff\xff\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x40084504, 0x0) 23:05:29 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14011, 0x0, 0x9e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040), 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000000)={r2, 0x32, 0x1000}, &(0x7f00000000c0)={'enc=', 'raw', ' hash=', {'sha256-avx\x00'}}, &(0x7f00000001c0)="a32da1bd5620f288ce056b15d8f60afddf7535b5144205aa1ec5312f30d01a370cf42233caafc36849d05e83871fe3fd4d83", &(0x7f0000000200)=""/4096) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:05:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x744d, 0x14004, 0x7ff, 0x3, r5}, &(0x7f00000001c0)=0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}, 0x40}, {{0x0, 0x0, &(0x7f0000005300)=[{0x0}], 0x1}}], 0x2, 0x20, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000008000)={0x400, 0xc, 0x4, 0x10, {0x0, 0x7530}, {0x1, 0x0, 0x0, 0x3f, 0x5, 0x8001, "ac7246e9"}, 0x878, 0x3, @fd, 0x4}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x4000) r5 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xefcf, 0x8200) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) ioctl$KVM_SMI(r4, 0xaeb7) 23:05:29 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000000c0), 0x4240, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) r3 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000280)={'veth1_to_bond\x00', {0x2, 0x4e23, @broadcast}}) sendto(r3, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f0000000240)=0x1000, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x18, 0x101, r0, &(0x7f0000000140)="80698eb09689dc960f27e81fbe1ba5d8bb1ca4667ce2feebc0eed3be0a4cd1eea2c5fcb68ee84df4ef1d6d3b3518597f793cd6964dcd662b8b4f4f22e8c971ea6734fd90ff7632038d27f051c187e670cf02a8ae895b146d6235e5a5259dcb6ed5d03c54e628c2f551871cf70be9dd4803f742375b970c24cfa90c362a89f34c7390845286709249fa3bbf824634de536c626a0682205bed928df2e5a286b90fb06f63eef2d1e591e5686c322c16c36f98e3844e71afbfbe7ea7b58d584b4b48457d399c2a2f70c6a9", 0xc9, 0x10001, 0x0, 0x2, r2}]) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x9}, 0x1c) 23:05:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000100)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000080)={r4, 0x3}, &(0x7f00000000c0)=0x8) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x7) r5 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r5, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r5, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r6 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r7}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000001c0)={r7, 0x7f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r8, 0xe2df, 0x5, [0x6, 0x9, 0x8, 0x2a, 0x100]}, &(0x7f0000000280)=0x12) 23:05:29 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/des/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r1, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0xbee0, 0x1, 0x9, 0x712c, 0x6, 0x7fff, 0x4}, 0x1c) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000040)={r4}) dup2(r0, r4) 23:05:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x744d, 0x14004, 0x7ff, 0x3, r5}, &(0x7f00000001c0)=0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x744d, 0x14004, 0x7ff, 0x3, r5}, &(0x7f00000001c0)=0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r1, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) sendto$inet(r0, 0x0, 0x13db, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 23:05:30 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0xd, &(0x7f0000000380), &(0x7f00000003c0)=0x8) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, {0x4, @dev={[], 0x13}}, 0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'bond0\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x42080) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000080)={0x8, 0x0, 0x4, {0xcc, 0x200, 0xa, 0x8000}}) 23:05:30 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x16000811}, 0x40000d8) lseek(r0, 0x0, 0x3) 23:05:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x744d, 0x14004, 0x7ff, 0x3, r5}, &(0x7f00000001c0)=0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:30 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x16000811}, 0x40000d8) lseek(r0, 0x0, 0x3) 23:05:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x372, 0x103000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x5, 0x7c, 0x0, 0x547, 0x2, 0x2, 0x2, 0x8, r2}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$packet(0x11, 0xa, 0x300) setsockopt$sock_int(r3, 0x1, 0x28, &(0x7f0000000040)=0x3f, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x68480) r5 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r5, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r7 = accept$alg(r6, 0x0, 0x0) sendmmsg$alg(r7, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x15f, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000300), 0x10) sendto(r5, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000140), 0x4) socketpair(0x2, 0x5, 0x41, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r8, 0x0, &(0x7f0000000100)={'ipddp0\x00', @ifru_addrs=@tipc=@name={0x1e, 0x2, 0x2, {{0x40, 0x1}}}}) 23:05:30 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000e00)={0x0, @in6={{0xa, 0x4e20, 0xe, @mcast2}}, 0x101, 0x7, 0x80000000, 0x8000000, 0x8}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r3, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x100) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x0, 0x0}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000380)={0x9920, "da05a903c6bdb2148ee3ec397fd59f9839f5bb9f899cb2fdb9bf6e8eb33593b1", 0x2, 0x0, 0x2, 0xf900, 0xe03, 0x4}) r6 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000640)={0x0, 0x3}) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x10000, 0x6}, {0xffffffff00000000}]}, 0x14, 0x1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000480)={0x7, 0x95bb71e550eeb01d, 0xb000}, 0x4) getpid() iopl(0x1) socket$inet(0x2, 0xa, 0x800) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) eventfd2(0x7, 0x81000) rmdir(&(0x7f0000000540)='./file0/file0\x00') execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 23:05:30 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x16000811}, 0x40000d8) lseek(r0, 0x0, 0x3) [ 218.245849][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 218.252681][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:05:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x744d, 0x14004, 0x7ff, 0x3, r5}, &(0x7f00000001c0)=0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:30 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x16000811}, 0x40000d8) lseek(r0, 0x0, 0x3) [ 218.360545][ T9250] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 23:05:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f000018efdc)="2400000052001f0014f9f407000904000200071008000700fe0500ff04000100feffffff", 0x24) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) ioctl(r0, 0x43, &(0x7f0000000140)="06cdd135f6a5124af4442f71086256230378c00ae5602c46d0c876f183068a5b1e6927e662e41b8e1191dc1d65e2ec2a9d5d6095085ce6959a7567283f0f03ff4449d9686722") sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000100)='lazytime\x00', 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x200000) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000200)='team_slave_0\x00') r4 = gettid() tkill(r4, 0x800040000000015) ptrace$poke(0x5, r4, &(0x7f0000000080), 0x1f) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x4000011, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x5) setsockopt$inet_int(r1, 0x0, 0xd, &(0x7f0000000000)=0x1, 0x4) 23:05:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12026}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r6, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r6, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f0000000140)={0x4, r6, 0xc3ae5db02bf9fb26}) r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r7, 0x0, 0x0) r8 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r8, 0x0, 0x0) dup2(r8, r0) r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r9, 0x0, 0x0) r10 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r10, 0x0, 0x0) r11 = dup3(r10, 0xffffffffffffffff, 0x140000) ioctl$VIDIOC_ENUMSTD(r11, 0xc0485619, &(0x7f0000000100)={0x3f, 0x80008, "69fb29e589f12d83c99bf614bd6c2cb3432c15e4b7c4785e", {0x2, 0x1}, 0x5}) 23:05:31 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) lseek(r0, 0x0, 0x3) [ 218.686543][ T9278] misc userio: Invalid payload size [ 218.708118][ T9278] misc userio: Invalid payload size 23:05:31 executing program 3: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) r0 = socket$unix(0x1, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x5c1df5c1695fec32, 0x0, 0x3}, 0xfffffffffffffffc}}, 0x18) sendto(r1, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0xb, 0x4) r3 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000080)={0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socket$bt_hidp(0x1f, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r7, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x14, r8, 0x4, 0x70bd25}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10180}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x12c, r8, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1ff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffff3717}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r9 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r9, 0xc0605345, 0x0) r10 = gettid() tkill(r10, 0x800040000000015) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r9, 0xc1105511, &(0x7f00000001c0)={{0x8, 0x6, 0x6, 0x3f, 'syz0\x00', 0x80000001}, 0x6, 0x200, 0x8001, r10, 0x5, 0x5, 'syz1\x00', &(0x7f0000000180)=['\x00', '/dev/bus/usb/00#/00#\x00', '\'4$\x00', '$.trusted\x00', 'system[#*\x00'], 0x2e, [], [0x5, 0x5, 0x100000001, 0x2]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r4, 0x40000, r5}) ioctl$sock_SIOCETHTOOL(r0, 0x89e0, 0x0) [ 218.738506][ T9278] misc userio: Invalid payload size 23:05:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:31 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000e00)={0x0, @in6={{0xa, 0x4e20, 0xe, @mcast2}}, 0x101, 0x7, 0x80000000, 0x8000000, 0x8}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r3, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x100) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x0, 0x0}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000380)={0x9920, "da05a903c6bdb2148ee3ec397fd59f9839f5bb9f899cb2fdb9bf6e8eb33593b1", 0x2, 0x0, 0x2, 0xf900, 0xe03, 0x4}) r6 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000640)={0x0, 0x3}) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x10000, 0x6}, {0xffffffff00000000}]}, 0x14, 0x1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000480)={0x7, 0x95bb71e550eeb01d, 0xb000}, 0x4) getpid() iopl(0x1) socket$inet(0x2, 0xa, 0x800) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) eventfd2(0x7, 0x81000) rmdir(&(0x7f0000000540)='./file0/file0\x00') execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 218.893140][ T9278] misc userio: Invalid payload size [ 218.950446][ T9294] misc userio: Invalid payload size [ 218.983978][ T9278] misc userio: Invalid payload size [ 219.019581][ T9278] misc userio: Invalid payload size 23:05:31 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) lseek(r0, 0x0, 0x3) [ 219.106101][ T9278] misc userio: Invalid payload size [ 219.107361][ T9276] misc userio: Invalid payload size 23:05:31 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') lseek(r0, 0x0, 0x3) 23:05:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12026}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r6, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r6, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f0000000140)={0x4, r6, 0xc3ae5db02bf9fb26}) r7 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r7, 0x0, 0x0) r8 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r8, 0x0, 0x0) dup2(r8, r0) r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r9, 0x0, 0x0) r10 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r10, 0x0, 0x0) r11 = dup3(r10, 0xffffffffffffffff, 0x140000) ioctl$VIDIOC_ENUMSTD(r11, 0xc0485619, &(0x7f0000000100)={0x3f, 0x80008, "69fb29e589f12d83c99bf614bd6c2cb3432c15e4b7c4785e", {0x2, 0x1}, 0x5}) 23:05:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:31 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 219.392791][ T9309] misc userio: Invalid payload size [ 219.443086][ T9314] misc userio: Invalid payload size [ 219.499201][ T9314] misc userio: Invalid payload size 23:05:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) [ 219.594903][ T9309] misc userio: Invalid payload size [ 219.602875][ T9309] misc userio: Invalid payload size [ 219.621652][ T9309] misc userio: Invalid payload size [ 219.632791][ T9309] misc userio: Invalid payload size 23:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) lseek(r0, 0x0, 0x3) 23:05:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) lseek(r0, 0x0, 0x3) 23:05:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) lseek(r0, 0x0, 0x3) 23:05:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:34 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) lseek(r0, 0x0, 0x3) 23:05:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000100)=0x8) fcntl$addseals(r1, 0x409, 0x8) 23:05:35 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) lseek(r0, 0x0, 0x3) 23:05:35 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:35 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000e00)={0x0, @in6={{0xa, 0x4e20, 0xe, @mcast2}}, 0x101, 0x7, 0x80000000, 0x8000000, 0x8}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r3, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x100) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x0, 0x0}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000380)={0x9920, "da05a903c6bdb2148ee3ec397fd59f9839f5bb9f899cb2fdb9bf6e8eb33593b1", 0x2, 0x0, 0x2, 0xf900, 0xe03, 0x4}) r6 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000640)={0x0, 0x3}) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x10000, 0x6}, {0xffffffff00000000}]}, 0x14, 0x1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000480)={0x7, 0x95bb71e550eeb01d, 0xb000}, 0x4) getpid() iopl(0x1) socket$inet(0x2, 0xa, 0x800) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) eventfd2(0x7, 0x81000) rmdir(&(0x7f0000000540)='./file0/file0\x00') execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 23:05:35 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1f000000cef0d47b4e0000005c0ddc942b63c13bc982d02f315e89af49b5335922d380ea821b5c7a3520454bef29610a48b92ac9c049a48ba66146b71ca8650116e19de42d0c3608917cfd3688364f459e3753eb7bd79ef326e3e0d74e3d8691a5541f5efdcade427f7e532e28317610bcd7ad4f9d6411e7f45222efe9c40b45f757af6b267864514fb411a5f27743eb6a5b9a87d93f4d43f67d0118b32b0fd215f18ae68da32134df41f8a5c8eb7e1ed6290a2259c6b35829c6a25cae2770dd1bd8302d9ba0649b6d11b62f9a74a0e47e68cd97c15de3dcc36fcab7ad5016ca3a242c5525e305c7333099dd2f", @ANYRES16=r4, @ANYBLOB="040025bd7000000000000b000000"], 0x3}, 0x1, 0x0, 0x0, 0x2c010}, 0x0) lseek(r0, 0x0, 0x3) 23:05:35 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:35 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') lseek(r0, 0x0, 0x3) 23:05:35 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:35 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000340)) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407000904000200071008000800fe0500ff0800010000000000", 0x24) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r1, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) r2 = gettid() tkill(r2, 0x800040000000015) r3 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r3, r4, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) sendmsg$netlink(r1, &(0x7f0000000300)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x406a0048}, 0xc, &(0x7f0000000200)=[{&(0x7f00000000c0)={0x108, 0x25, 0x20, 0x70bd26, 0x25dfdbfb, "", [@nested={0xb4, 0x6e, [@typed={0x8, 0x3e, @ipv4=@remote}, @generic="62344a54d1a5e906bfb9fa2d4484be0ff7ff031dfacc5d49ae5eb56f6297a3dfc678e6750c14c6ec52a8754c3fc6bc74d6ed4a75add733a29a38cc36561a3507ec05c956288db37bc0b2569c4229d16bfca291e5485f8379acea40fa73e94afcb368ba5e774ad94ea71d15b7e16bfe13312f8476b4723190557ac4d500f060b93ba9570ae1672f99ac3ef74aab67529e3fc51b72d62ddc52aa65ff5861157caa16466ba59f"]}, @typed={0x8, 0x61, @u32=0x2}, @generic="a52bc2adf6705655dcb59c2e9c03d1f77335b7ac7db31213dd0f8f19cf591d15f80db70fb028e57cb28f21ef5f1718d80b980c9c87e7c093cca8e07b"]}, 0x108}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r6}}}], 0x20, 0x800}, 0x4800) 23:05:35 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:35 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x4000, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f0000001200)={&(0x7f0000000500)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000880)=[{0x730, 0x29, 0x3, "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"}], 0x730}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x70a, 0x9e4ccbf9b3aa692a) r3 = gettid() tkill(r3, 0x800040000000015) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)) r4 = gettid() tkill(r4, 0x800040000000015) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) r6 = syz_open_procfs(r5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x8208, 0x400, 0x0, r7}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e22, 0x4102900d, @remote, 0x8}}, 0x5, 0xffffffffffffffc1, 0x401, 0xd9c, 0x4}, &(0x7f0000000140)=0x98) 23:05:35 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:35 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) lseek(r0, 0x0, 0x3) 23:05:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc020660b, &(0x7f0000000300)={0x0, 0x0, 0x2, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x70e000}}}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x3a, @multicast2, 0x4e21, 0x3, 'none\x00', 0x21, 0x7, 0x66}, 0x2c) io_setup(0x400, 0x0) 23:05:36 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:36 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) lseek(r0, 0x0, 0x3) 23:05:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:38 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) lseek(r0, 0x0, 0x3) 23:05:38 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc020660b, &(0x7f0000000300)={0x0, 0x0, 0x2, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x70e000}}}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x3a, @multicast2, 0x4e21, 0x3, 'none\x00', 0x21, 0x7, 0x66}, 0x2c) io_setup(0x400, 0x0) 23:05:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:38 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) syz_open_procfs(0x0, 0x0) fcntl$addseals(r1, 0x409, 0x8) 23:05:38 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r1, 0x409, 0x8) 23:05:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) clone(0x12ffa, 0x0, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15m-S\x92\x92~T\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbe\xd8T\x9c\x00', 0xffffffffffffffff}) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r1, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000080), 0x4) r3 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x9, @mcast2}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x20, @dev={0xfe, 0x80, [], 0x16}, 0x7}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e22, 0x7, @rand_addr="fdef240120935c1a487b33011d5d0e6f", 0x480000}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e20, 0x8, @rand_addr="63cc6e52875948a22d16bb51d6722148", 0x6}, @in={0x2, 0x4e21, @multicast1}], 0xb0) 23:05:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:39 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:39 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000dfdb4fce6a4b51220001040000000000ba3a903f3e798e30ea0f34f08e33a0ff65d0bc6843de2220d9f394ea2344ee9bf4c29c52f3f5046eb605793c8ea3b3de647e6dae925ef2602fbc76e073087dfe33b06b4147c53c4fd749bdb987613361eeb0cdc53cc4fd0d490048c6a96d56acec1627f9bc136e190a82f74669722c7316923a8432c2e86e2f51df58d386e8a758a2d2c39212764b4b51506ff9538aab6bf765edc776ec25fe8deafa5cf9bf794e328af6ecf8794bf1e583d364ccc316d23a8d15a3d998fc8186ecd1c32583a3ad22847ef0d13dfb03a890d0d3e999cc4d710b628df95a845cc66ab81c4052cd21b5b7cac7c1a7a31fe418342649e1941927d9245420370d5b5e72f109edca683a3485b77b01337575097e18e58b96d50d2b1da67b56e6542b89838974fdadbd0763105193f57793806d739701ebc854f5c6a3a11d9d467ae5708989"], 0x14}, 0x1, 0x0, 0x0, 0x10002}, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2000, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in=@local, @in=@broadcast, 0xfffffffffffffffc}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0x5c}, 0x8}, 0x0) [ 226.686973][ T9491] input input7: cannot allocate more than FF_MAX_EFFECTS effects 23:05:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:39 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000007c0)={@remote, @mcast1, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000012}) 23:05:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r1, 0x409, 0x8) 23:05:39 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000000)=""/63) io_setup(0x1, &(0x7f0000000040)=0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x2b) io_submit(r1, 0x2, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xffffff81}]) r3 = semget$private(0x0, 0x1, 0x466) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000000), 0x0, &(0x7f0000000100)={r4, r5+30000000}) 23:05:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='\x890\xe6\xfe^\xbc\xbe\x90\x007\xc3\x00', 0xb781df9884e7a95a, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, 0x0, 0x0) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, 0x0, 0x0) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[]}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 23:05:39 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x101200, 0x0) io_setup(0x5, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 227.096531][ T9522] misc userio: Invalid payload size 23:05:39 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 227.162893][ T9522] misc userio: Invalid payload size 23:05:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 227.216454][ T9529] misc userio: Invalid payload size [ 227.226121][ T9533] misc userio: Invalid payload size [ 227.241226][ T9533] [ 227.241983][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 227.243587][ T9533] ===================================================== [ 227.258672][ T9533] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 227.265587][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.266134][ T9533] 5.3.0+ #0 Not tainted [ 227.280420][ T9533] ----------------------------------------------------- [ 227.287356][ T9533] syz-executor.1/9533 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 227.295323][ T9533] ffff88808e8be568 (&fiq->waitq){+.+.}, at: io_submit_one+0xefa/0x2ef0 [ 227.303579][ T9533] [ 227.303579][ T9533] and this task is already holding: 23:05:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 227.310965][ T9533] ffff8880a51ac1d8 (&(&ctx->ctx_lock)->rlock){..-.}, at: io_submit_one+0xeb5/0x2ef0 [ 227.320360][ T9533] which would create a new lock dependency: [ 227.326241][ T9533] (&(&ctx->ctx_lock)->rlock){..-.} -> (&fiq->waitq){+.+.} [ 227.333441][ T9533] [ 227.333441][ T9533] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 227.336043][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 227.342882][ T9533] (&(&ctx->ctx_lock)->rlock){..-.} [ 227.342892][ T9533] [ 227.342892][ T9533] ... which became SOFTIRQ-irq-safe at: 23:05:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 227.361072][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.362960][ T9533] lock_acquire+0x190/0x410 [ 227.362978][ T9533] _raw_spin_lock_irq+0x60/0x80 [ 227.382708][ T9533] free_ioctx_users+0x2d/0x490 [ 227.387569][ T9533] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 227.393814][ T9533] rcu_core+0x581/0x1560 [ 227.398142][ T9533] rcu_core_si+0x9/0x10 [ 227.402392][ T9533] __do_softirq+0x262/0x98c [ 227.406989][ T9533] irq_exit+0x19b/0x1e0 [ 227.411348][ T9533] smp_apic_timer_interrupt+0x1a3/0x610 23:05:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 227.417252][ T9533] apic_timer_interrupt+0xf/0x20 [ 227.422330][ T9533] __sanitizer_cov_trace_pc+0x0/0x50 [ 227.427803][ T9533] tomoyo_supervisor+0x2e8/0xef0 [ 227.432844][ T9533] tomoyo_path_permission+0x263/0x360 [ 227.438312][ T9533] tomoyo_path_perm+0x31d/0x430 [ 227.443246][ T9533] tomoyo_inode_getattr+0x1d/0x30 [ 227.448466][ T9533] security_inode_getattr+0xf2/0x150 [ 227.453857][ T9533] vfs_getattr+0x25/0x70 [ 227.458186][ T9533] vfs_statx+0x157/0x200 [ 227.462515][ T9533] __do_sys_newlstat+0xa4/0x130 23:05:40 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 227.464719][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 227.467466][ T9533] __x64_sys_newlstat+0x54/0x80 [ 227.467480][ T9533] do_syscall_64+0xfa/0x760 [ 227.467494][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.467499][ T9533] [ 227.467499][ T9533] to a SOFTIRQ-irq-unsafe lock: [ 227.467502][ T9533] (&fiq->waitq){+.+.} [ 227.467521][ T9533] [ 227.467521][ T9533] ... which became SOFTIRQ-irq-unsafe at: [ 227.489089][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.490082][ T9533] ... [ 227.490105][ T9533] lock_acquire+0x190/0x410 [ 227.517640][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 227.519948][ T9533] _raw_spin_lock+0x2f/0x40 [ 227.519969][ T9533] flush_bg_queue+0x1f3/0x3c0 [ 227.526118][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 227.527377][ T9533] fuse_request_queue_background+0x2f8/0x5a0 [ 227.527395][ T9533] fuse_request_send_background+0x58/0x110 [ 227.565889][ T9533] cuse_channel_open+0x5ba/0x830 [ 227.570924][ T9533] misc_open+0x395/0x4c0 [ 227.575260][ T9533] chrdev_open+0x245/0x6b0 [ 227.579937][ T9533] do_dentry_open+0x4df/0x1250 [ 227.580051][ T9522] misc userio: Invalid payload size [ 227.584793][ T9533] vfs_open+0xa0/0xd0 [ 227.592350][ T9529] misc userio: Invalid payload size [ 227.594020][ T9533] path_openat+0x10e9/0x4630 [ 227.594040][ T9533] do_filp_open+0x1a1/0x280 [ 227.600985][ T9553] misc userio: Invalid payload size [ 227.604150][ T9533] do_sys_open+0x3fe/0x5d0 [ 227.604164][ T9533] __x64_sys_openat+0x9d/0x100 [ 227.604185][ T9533] do_syscall_64+0xfa/0x760 [ 227.609420][ T9522] misc userio: Invalid payload size [ 227.613937][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.613942][ T9533] [ 227.613942][ T9533] other info that might help us debug this: [ 227.613942][ T9533] [ 227.613947][ T9533] Possible interrupt unsafe locking scenario: [ 227.613947][ T9533] [ 227.613949][ T9533] CPU0 CPU1 [ 227.613952][ T9533] ---- ---- [ 227.613963][ T9533] lock(&fiq->waitq); [ 227.645798][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 227.649291][ T9533] local_irq_disable(); [ 227.669982][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 227.672352][ T9533] lock(&(&ctx->ctx_lock)->rlock); [ 227.672362][ T9533] lock(&fiq->waitq); [ 227.672368][ T9533] [ 227.672370][ T9533] lock(&(&ctx->ctx_lock)->rlock); [ 227.718022][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 227.719936][ T9533] [ 227.719936][ T9533] *** DEADLOCK *** [ 227.719936][ T9533] [ 227.735164][ T9533] 1 lock held by syz-executor.1/9533: [ 227.735298][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.740602][ T9533] #0: ffff8880a51ac1d8 (&(&ctx->ctx_lock)->rlock){..-.}, at: io_submit_one+0xeb5/0x2ef0 [ 227.740639][ T9533] [ 227.740639][ T9533] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 227.740648][ T9533] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 227.740658][ T9533] IN-SOFTIRQ-W at: [ 227.740677][ T9533] lock_acquire+0x190/0x410 [ 227.740689][ T9533] _raw_spin_lock_irq+0x60/0x80 [ 227.740701][ T9533] free_ioctx_users+0x2d/0x490 [ 227.740716][ T9533] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 227.740734][ T9533] rcu_core+0x581/0x1560 [ 227.813764][ T9533] rcu_core_si+0x9/0x10 [ 227.819553][ T9533] __do_softirq+0x262/0x98c [ 227.825690][ T9533] irq_exit+0x19b/0x1e0 [ 227.831501][ T9533] smp_apic_timer_interrupt+0x1a3/0x610 [ 227.838692][ T9533] apic_timer_interrupt+0xf/0x20 [ 227.845363][ T9533] __sanitizer_cov_trace_pc+0x0/0x50 [ 227.852292][ T9533] tomoyo_supervisor+0x2e8/0xef0 [ 227.858873][ T9533] tomoyo_path_permission+0x263/0x360 [ 227.865965][ T9533] tomoyo_path_perm+0x31d/0x430 [ 227.872450][ T9533] tomoyo_inode_getattr+0x1d/0x30 [ 227.879100][ T9533] security_inode_getattr+0xf2/0x150 [ 227.886020][ T9533] vfs_getattr+0x25/0x70 [ 227.892003][ T9533] vfs_statx+0x157/0x200 [ 227.897882][ T9533] __do_sys_newlstat+0xa4/0x130 [ 227.904358][ T9533] __x64_sys_newlstat+0x54/0x80 [ 227.910852][ T9533] do_syscall_64+0xfa/0x760 [ 227.916986][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.924501][ T9533] INITIAL USE at: [ 227.928395][ T9533] lock_acquire+0x190/0x410 [ 227.934452][ T9533] _raw_spin_lock_irq+0x60/0x80 [ 227.940860][ T9533] io_submit_one+0xeb5/0x2ef0 [ 227.947102][ T9533] __x64_sys_io_submit+0x1bd/0x570 [ 227.954366][ T9533] do_syscall_64+0xfa/0x760 [ 227.960520][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.967949][ T9533] } [ 227.970447][ T9533] ... key at: [] __key.54288+0x0/0x40 [ 227.978010][ T9533] ... acquired at: [ 227.981824][ T9533] lock_acquire+0x190/0x410 [ 227.986581][ T9533] _raw_spin_lock+0x2f/0x40 [ 227.991254][ T9533] io_submit_one+0xefa/0x2ef0 [ 227.996115][ T9533] __x64_sys_io_submit+0x1bd/0x570 [ 228.001394][ T9533] do_syscall_64+0xfa/0x760 [ 228.006062][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.012107][ T9533] [ 228.015540][ T9533] [ 228.015540][ T9533] the dependencies between the lock to be acquired [ 228.015543][ T9533] and SOFTIRQ-irq-unsafe lock: [ 228.032760][ T9533] -> (&fiq->waitq){+.+.} { [ 228.037155][ T9533] HARDIRQ-ON-W at: [ 228.041124][ T9533] lock_acquire+0x190/0x410 [ 228.047529][ T9533] _raw_spin_lock+0x2f/0x40 [ 228.053688][ T9533] flush_bg_queue+0x1f3/0x3c0 [ 228.060090][ T9533] fuse_request_queue_background+0x2f8/0x5a0 [ 228.067799][ T9533] fuse_request_send_background+0x58/0x110 [ 228.075420][ T9533] cuse_channel_open+0x5ba/0x830 [ 228.082080][ T9533] misc_open+0x395/0x4c0 [ 228.088061][ T9533] chrdev_open+0x245/0x6b0 [ 228.094107][ T9533] do_dentry_open+0x4df/0x1250 [ 228.100507][ T9533] vfs_open+0xa0/0xd0 [ 228.106123][ T9533] path_openat+0x10e9/0x4630 [ 228.112436][ T9533] do_filp_open+0x1a1/0x280 [ 228.118600][ T9533] do_sys_open+0x3fe/0x5d0 [ 228.124664][ T9533] __x64_sys_openat+0x9d/0x100 [ 228.131078][ T9533] do_syscall_64+0xfa/0x760 [ 228.137225][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.144773][ T9533] SOFTIRQ-ON-W at: [ 228.148795][ T9533] lock_acquire+0x190/0x410 [ 228.154972][ T9533] _raw_spin_lock+0x2f/0x40 [ 228.161112][ T9533] flush_bg_queue+0x1f3/0x3c0 [ 228.167434][ T9533] fuse_request_queue_background+0x2f8/0x5a0 [ 228.175053][ T9533] fuse_request_send_background+0x58/0x110 [ 228.182491][ T9533] cuse_channel_open+0x5ba/0x830 [ 228.189061][ T9533] misc_open+0x395/0x4c0 [ 228.194950][ T9533] chrdev_open+0x245/0x6b0 [ 228.201001][ T9533] do_dentry_open+0x4df/0x1250 [ 228.207392][ T9533] vfs_open+0xa0/0xd0 [ 228.213011][ T9533] path_openat+0x10e9/0x4630 [ 228.219228][ T9533] do_filp_open+0x1a1/0x280 [ 228.225540][ T9533] do_sys_open+0x3fe/0x5d0 [ 228.231642][ T9533] __x64_sys_openat+0x9d/0x100 [ 228.238057][ T9533] do_syscall_64+0xfa/0x760 [ 228.244298][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.251835][ T9533] INITIAL USE at: [ 228.255821][ T9533] lock_acquire+0x190/0x410 [ 228.261865][ T9533] _raw_spin_lock+0x2f/0x40 [ 228.267913][ T9533] flush_bg_queue+0x1f3/0x3c0 [ 228.274141][ T9533] fuse_request_queue_background+0x2f8/0x5a0 [ 228.281663][ T9533] fuse_request_send_background+0x58/0x110 [ 228.289155][ T9533] cuse_channel_open+0x5ba/0x830 [ 228.295649][ T9533] misc_open+0x395/0x4c0 [ 228.301446][ T9533] chrdev_open+0x245/0x6b0 [ 228.308474][ T9533] do_dentry_open+0x4df/0x1250 [ 228.314808][ T9533] vfs_open+0xa0/0xd0 [ 228.320341][ T9533] path_openat+0x10e9/0x4630 [ 228.326491][ T9533] do_filp_open+0x1a1/0x280 [ 228.332626][ T9533] do_sys_open+0x3fe/0x5d0 [ 228.338682][ T9533] __x64_sys_openat+0x9d/0x100 [ 228.344997][ T9533] do_syscall_64+0xfa/0x760 [ 228.351078][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.358523][ T9533] } [ 228.361016][ T9533] ... key at: [] __key.44671+0x0/0x40 [ 228.368446][ T9533] ... acquired at: [ 228.372241][ T9533] lock_acquire+0x190/0x410 [ 228.376896][ T9533] _raw_spin_lock+0x2f/0x40 [ 228.381550][ T9533] io_submit_one+0xefa/0x2ef0 [ 228.386381][ T9533] __x64_sys_io_submit+0x1bd/0x570 [ 228.391643][ T9533] do_syscall_64+0xfa/0x760 [ 228.396297][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.402329][ T9533] [ 228.404657][ T9533] [ 228.404657][ T9533] stack backtrace: [ 228.410527][ T9533] CPU: 0 PID: 9533 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 228.418008][ T9533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.428569][ T9533] Call Trace: [ 228.431882][ T9533] dump_stack+0x172/0x1f0 [ 228.436209][ T9533] check_irq_usage.cold+0x586/0x6fe [ 228.441385][ T9533] ? check_usage_forwards+0x330/0x330 [ 228.446817][ T9533] ? __bfs+0x26/0x530 [ 228.450777][ T9533] ? check_path+0x26/0x40 [ 228.455081][ T9533] ? __kasan_check_read+0x11/0x20 [ 228.460080][ T9533] ? check_noncircular+0x16d/0x3e0 [ 228.465169][ T9533] ? print_circular_bug.isra.0+0x230/0x230 [ 228.470966][ T9533] ? alloc_list_entry+0xc0/0xc0 [ 228.475817][ T9533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.482069][ T9533] ? find_first_zero_bit+0x9a/0xc0 [ 228.487176][ T9533] __lock_acquire+0x25d0/0x4e70 [ 228.492005][ T9533] ? __lock_acquire+0x25d0/0x4e70 [ 228.497027][ T9533] ? mark_held_locks+0xf0/0xf0 [ 228.501810][ T9533] lock_acquire+0x190/0x410 [ 228.506317][ T9533] ? io_submit_one+0xefa/0x2ef0 [ 228.511165][ T9533] _raw_spin_lock+0x2f/0x40 [ 228.515656][ T9533] ? io_submit_one+0xefa/0x2ef0 [ 228.520485][ T9533] io_submit_one+0xefa/0x2ef0 [ 228.525142][ T9533] ? lookup_ioctx+0x1d7/0x830 [ 228.529821][ T9533] ? aio_poll_complete_work+0xfb0/0xfb0 [ 228.535343][ T9533] ? aio_setup_rw+0x180/0x180 [ 228.540003][ T9533] __x64_sys_io_submit+0x1bd/0x570 [ 228.545091][ T9533] ? __x64_sys_io_submit+0x1bd/0x570 [ 228.550442][ T9533] ? __ia32_sys_io_destroy+0x420/0x420 [ 228.555894][ T9533] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 228.561348][ T9533] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 228.566798][ T9533] ? do_syscall_64+0x26/0x760 [ 228.572352][ T9533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.578408][ T9533] ? do_syscall_64+0x26/0x760 [ 228.583081][ T9533] ? lockdep_hardirqs_on+0x421/0x5e0 [ 228.589410][ T9533] do_syscall_64+0xfa/0x760 [ 228.593895][ T9533] ? do_syscall_64+0xfa/0x760 [ 228.598591][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.604461][ T9533] RIP: 0033:0x459a09 [ 228.608344][ T9533] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.628276][ T9533] RSP: 002b:00007fe21602ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 228.636755][ T9533] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 228.644884][ T9533] RDX: 0000000020002600 RSI: 0000000000000002 RDI: 00007fe21600e000 [ 228.652840][ T9533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.660792][ T9533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe21602f6d4 23:05:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r1, 0x409, 0x8) [ 228.668740][ T9533] R13: 00000000004c0dea R14: 00000000004d3f98 R15: 00000000ffffffff [ 228.697732][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 228.704902][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:05:41 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000000)=""/63) io_setup(0x1, &(0x7f0000000040)=0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x2b) io_submit(r1, 0x2, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xffffff81}]) r3 = semget$private(0x0, 0x1, 0x466) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000000), 0x0, &(0x7f0000000100)={r4, r5+30000000}) 23:05:41 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 228.749879][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 228.757131][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 228.802334][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 228.831933][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:05:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:41 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 228.858302][ T9574] misc userio: Invalid payload size [ 228.865282][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 228.879907][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:41 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 228.929160][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 228.959664][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r1, 0x409, 0x8) 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 228.974275][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 228.984227][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.999104][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env 23:05:41 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 229.028247][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) lseek(r0, 0x0, 0x3) 23:05:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) [ 229.098557][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 229.109270][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:05:41 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) lseek(r0, 0x0, 0x3) [ 229.139174][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 229.151949][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:41 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 229.179489][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 229.193976][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.210301][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 229.230136][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.247765][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 229.255137][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.266926][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env 23:05:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) 23:05:41 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(r0, 0x0, 0x3) 23:05:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r1, 0x409, 0x8) 23:05:41 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 229.280631][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.306210][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 229.318703][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:05:41 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) 23:05:41 executing program 4: lseek(0xffffffffffffffff, 0x0, 0x3) [ 229.374210][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 229.391140][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.414387][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env 23:05:41 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:41 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) 23:05:41 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 229.429689][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.458639][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env 23:05:42 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) [ 229.475436][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.501629][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 229.511110][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.523301][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 229.530637][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.544038][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 229.551370][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.570854][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 229.578084][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.590614][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 229.597830][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 229.609799][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 229.617039][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:42 executing program 4: lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:42 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:42 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) 23:05:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r1, 0x409, 0x8) [ 229.628523][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 229.635854][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:42 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) 23:05:42 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:42 executing program 4: lseek(0xffffffffffffffff, 0x0, 0x3) [ 229.676954][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 229.684145][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:05:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 229.758342][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 229.796828][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.828547][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 229.837005][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.850071][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 229.858821][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.870535][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 229.877819][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.890264][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 229.899385][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 229.912108][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 229.919992][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.932747][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 229.940097][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.954025][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 229.961335][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:42 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) lseek(r0, 0x0, 0x3) 23:05:42 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) lseek(r0, 0x0, 0x3) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) syz_open_dev$vbi(0x0, 0x1, 0x2) fcntl$addseals(r1, 0x409, 0x8) [ 229.973201][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 229.980586][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.992052][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 229.999297][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:05:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:42 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) lseek(r0, 0x0, 0x3) [ 230.029662][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env 23:05:42 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) lseek(r0, 0x0, 0x3) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 230.072675][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 230.097345][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 230.115116][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:05:42 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) lseek(r0, 0x0, 0x3) 23:05:42 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) lseek(r0, 0x0, 0x3) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 230.154840][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.165983][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.183056][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 230.193953][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 230.226848][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 230.254624][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.269377][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 230.277380][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.290090][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 230.297286][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.308847][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.316189][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:42 executing program 4: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:42 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:42 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) sendto(r2, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) [ 230.328175][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 230.335313][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 230.347531][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.354789][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.366482][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 230.380765][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:43 executing program 4: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:43 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) [ 230.449550][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.467244][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:43 executing program 4: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 230.498374][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 230.509148][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 230.527707][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env 23:05:43 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) [ 230.545552][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.562666][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 230.575758][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.593956][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 230.602270][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.625370][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.633460][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.655096][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 230.665307][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 230.683380][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.691073][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(r0, 0x0, 0x0) 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 23:05:43 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 23:05:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 230.702617][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env 23:05:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) syz_open_dev$vbi(0x0, 0x1, 0x2) fcntl$addseals(r1, 0x409, 0x8) 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 230.737816][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:05:43 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(r0, 0x0, 0x0) 23:05:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) [ 230.795772][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 230.803045][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) [ 230.836384][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 230.849121][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:43 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) lseek(r0, 0x0, 0x0) 23:05:43 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 23:05:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 230.892564][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 230.921951][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) lseek(r0, 0x0, 0x3) 23:05:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) [ 230.974718][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 231.005242][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) syz_open_dev$vbi(0x0, 0x1, 0x2) fcntl$addseals(r1, 0x409, 0x8) 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) [ 231.071613][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) lseek(r0, 0x0, 0x3) 23:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 231.117726][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) [ 231.163636][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 231.182230][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:05:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:43 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) lseek(r0, 0x0, 0x3) 23:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) [ 231.227739][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 231.244230][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.262507][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 231.270083][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:05:43 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) [ 231.304416][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 231.318788][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:05:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) syz_open_dev$vbi(0x0, 0x1, 0x2) fcntl$addseals(r1, 0x409, 0x8) 23:05:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) fcntl$addseals(r0, 0x409, 0x8) [ 231.370067][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 231.387193][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 231.429854][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 231.450025][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:05:44 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) 23:05:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x3) [ 231.502193][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 231.542279][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.569373][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 231.599725][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) fcntl$addseals(r0, 0x409, 0x8) [ 231.623455][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env [ 231.631020][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 231.645392][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 231.652927][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 231.672759][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 231.684350][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 231.710018][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env 23:05:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) syz_open_dev$vbi(0x0, 0x1, 0x2) fcntl$addseals(r1, 0x409, 0x8) 23:05:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:44 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) [ 231.725412][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 231.747991][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 23:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) [ 231.783294][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.819811][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env 23:05:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) [ 231.852528][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.885408][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) [ 231.908852][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 231.939050][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 231.963632][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.981828][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 231.989574][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 232.004679][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 232.012161][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 232.029637][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 232.037039][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 232.049304][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 232.056451][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 232.067959][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 232.075118][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 232.086683][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 232.093875][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 232.105261][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env 23:05:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:44 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 23:05:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) [ 232.113596][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 232.125184][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 232.136962][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) [ 232.204954][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 232.231085][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 232.277223][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 232.284406][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 232.334521][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 232.360709][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 232.398571][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 232.406307][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 232.418100][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 232.427168][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 232.438626][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env 23:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 232.445849][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 232.457582][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 232.464735][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r0, 0x409, 0x8) [ 232.499231][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 232.523677][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:05:45 executing program 4: r0 = memfd_create(0x0, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) [ 232.548453][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 232.569817][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' 23:05:45 executing program 4: r0 = memfd_create(0x0, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) fcntl$addseals(r0, 0x409, 0x8) [ 232.611600][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 232.629107][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) [ 232.666666][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env [ 232.679421][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 232.697139][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env [ 232.715615][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 232.744260][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 232.751727][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:05:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 4: r0 = memfd_create(0x0, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 232.773785][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 232.814091][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 232.833646][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env [ 232.850413][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 232.862374][ T3893] kobject: 'loop5' (00000000273671ac): kobject_uevent_env 23:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) [ 232.892073][ T3893] kobject: 'loop5' (00000000273671ac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 232.923986][ T3893] kobject: 'loop0' (000000007002b719): kobject_uevent_env 23:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0x8) [ 232.948045][ T3893] kobject: 'loop0' (000000007002b719): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 232.961906][ T3893] kobject: 'loop2' (00000000fd9aa975): kobject_uevent_env [ 232.969370][ T3893] kobject: 'loop2' (00000000fd9aa975): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 232.987741][ T3893] kobject: 'loop4' (00000000313cb2c9): kobject_uevent_env 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) fcntl$addseals(r0, 0x409, 0x8) [ 233.023042][ T3893] kobject: 'loop4' (00000000313cb2c9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 233.060990][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env 23:05:45 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) [ 233.068871][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 233.104558][ T3893] kobject: 'loop3' (000000003fe400b5): kobject_uevent_env 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x356, 0xd, 0x1, {{0x20, 0x0, 0x15}, 0xfffffffffffffffc}}, 0xffffffffffffffd0) sendto(0xffffffffffffffff, &(0x7f0000000500)="05e6cc11773d99d48cb23afa88f9cb4d171acc36f33493bf4d9d4e743c75ae04df67cb82e4f967018e2677dd58636bdb6b40e094353eabd69c68fb30a47b1237dd2d61b903aa026560e372c5e3c056a93313a23481250950f164555e9346fb8ad71c2a6b9b7f07744c5564edc64f2b91102e191bd3c60479005451d7900fd9da17b7295d18ebc20e29b65e0fe42e7687cc67298f816e1d2b8df8504277f34a5f3c5208f135c38afca12569e78a58042c7ee13cd74e04225ab3c06b48439a40fe7caae5", 0xc3, 0x0, &(0x7f0000000600)=@isdn={0x22, 0x1f, 0x80000001, 0x4, 0x498d3f58}, 0x80) fcntl$addseals(r1, 0x409, 0x8) [ 233.141130][ T3893] kobject: 'loop3' (000000003fe400b5): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:05:45 executing program 4: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) 23:05:45 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) [ 233.183639][ T3893] kobject: 'loop1' (00000000e99897d2): kobject_uevent_env [ 233.204593][ T3893] kobject: 'loop1' (00000000e99897d2): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16F\x99\x02u\x9b\x94\x00'/24, 0x3) fcntl$addseals(r0, 0x409, 0x8) 23:05:45 executi